A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks

被引:4
作者
Yin, Xiaoyan [1 ,2 ]
Lin, Wanyu [4 ]
Sun, Kexin [3 ]
Wei, Chun [1 ,2 ]
Chen, Yanjiao [5 ]
机构
[1] Northwest Univ, Sch Informat Sci & Technol, Xian 710127, Peoples R China
[2] Shaanxi Int Joint Res Ctr Battery Free Internet Th, Xian 710127, Peoples R China
[3] BYD Co, Xian 710065, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[5] Zhejiang Univ, Coll Elect Engn, Hangzhou 310007, Peoples R China
基金
中国国家自然科学基金;
关键词
Social computing; adversarial machine learning; white-box attack; graph neural networks;
D O I
10.1109/TIFS.2022.3219342
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
status, the social influence of a user, plays an important role in many real-world applications, e.g., trust relations and information propagation in a social network. In this paper, we reveal the possibility of falsifying social status through adversarial attacks in graph neural networks (GNNs). Different from neural networks in the visual or speech domain, GNNs take the attributes of nodes and edges in a graph as features. To cater to the characteristics of GNNs, we design a new paradigm of adversarial example attack, named A(2)S(2)-GNN (GNN-based Adversarial Attacks on Social Status), aiming at manipulating the social status of a target node in social networks. The key idea is to establish relationships or break relationships between a set of compromised nodes and the target node. More specifically, we consider a signed directed graph representing complicated positive/negative asymmetric relationships between nodes. We design an efficient adversarial attack algorithm to determine the minimum set of signed links that should be created or deleted to reach the attack objective. We conduct extensive experiments on baseline datasets. Compared with the benchmark algorithms, A(2)S(2)-GNN can effectively promote or vilify the social status of the target node up to 89.36% and 192.38%, respectively, while keeping the modification to the social network to the minimum. Furthermore, the experimental results on six status evaluating algorithms verify the transferability of our proposed attack algorithm.
引用
收藏
页码:206 / 220
页数:15
相关论文
共 42 条
  • [1] Bojchevski A, 2019, PR MACH LEARN RES, V97
  • [2] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [3] Chang H, 2020, AAAI CONF ARTIF INTE, V34, P3389
  • [4] Link Prediction Adversarial Attack Via Iterative Gradient Attack
    Chen, Jinyin
    Lin, Xiang
    Shi, Ziqiang
    Liu, Yi
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (04) : 1081 - 1094
  • [5] Dai EY, 2023, Arxiv, DOI [arXiv:2204.08570, 10.48550/arXiv.2204.08570]
  • [6] Dai HJ, 2018, PR MACH LEARN RES, V80
  • [7] Signed Graph Convolutional Networks
    Derr, Tyler
    Ma, Yao
    Tang, Jiliang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 929 - 934
  • [8] Signed Network Modeling Based on Structural Balance Theory
    Derr, Tyler
    Aggarwal, Charu
    Tang, Jiliang
    [J]. CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 557 - 566
  • [9] SET OF MEASURES OF CENTRALITY BASED ON BETWEENNESS
    FREEMAN, LC
    [J]. SOCIOMETRY, 1977, 40 (01): : 35 - 41