Adversarial attack on BC classification for scale-free networks

被引:2
作者
Xuan, Qi [1 ,2 ]
Shan, Yalu [1 ,2 ]
Wang, Jinhuan [1 ,2 ]
Ruan, Zhongyuan [1 ,2 ]
Chen, Guanrong [3 ]
机构
[1] Zhejiang Univ Technol, Inst Cyberspace Secur, Hangzhou 310023, Peoples R China
[2] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Peoples R China
[3] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1063/5.0003707
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Adversarial attacks have been alerting the artificial intelligence community recently since many machine learning algorithms were found vulnerable to malicious attacks. This paper studies adversarial attacks on Broido and Clauset classification for scale-free networks to test its robustness in terms of statistical measures. In addition to the well-known random link rewiring (RLR) attack, two heuristic attacks are formulated and simulated: degree-addition-based link rewiring (DALR) and degree-interval-based link rewiring (DILR). These three strategies are applied to attack a number of strong scale-free networks of various sizes generated from the Barabasi-Albert model and the uncorrelated configuration model. It is found that both DALR and DILR are more effective than RLR in the sense that rewiring a smaller number of links can succeed in the same attack. However, DILR is as concealed as RLR in the sense that they both are introducing a relatively small change on several typical structural properties, such as the average shortest path-length, the average clustering coefficient, the average diagonal distance, and the Kolmogorov-Smirnov test of the degree distribution. The results of this paper suggest that to classify a network to be scale-free, one has to be very careful from the viewpoint of adversarial attack effects.
引用
收藏
页数:14
相关论文
共 51 条
[21]  
Goodfellow I.J., 2014, 3 INT C LEARNING REP
[22]   Epidemic dynamics on an adaptive network [J].
Gross, Thilo ;
D'Lima, Carlos J. Dommar ;
Blasius, Bernd .
PHYSICAL REVIEW LETTERS, 2006, 96 (20)
[23]  
Klarreich E., 2018, QUANTA MAG
[24]   Connectivity of growing random networks [J].
Krapivsky, PL ;
Redner, S ;
Leyvraz, F .
PHYSICAL REVIEW LETTERS, 2000, 85 (21) :4629-4632
[25]   Disinformation on the Web: Impact, Characteristics, and Detection of Wikipedia Hoaxes [J].
Kumar, Srijan ;
West, Robert ;
Leskovec, Jure .
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16), 2016, :591-602
[26]  
Kurakin A., 2016, INT C LEARNING REPRE
[27]   Complexity and synchronization of the World trade Web [J].
Li, X ;
Jin, YY ;
Chen, GR .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2003, 328 (1-2) :287-296
[28]  
Molontay R., 2020, ARXIV200109006
[29]   Universal adversarial perturbations [J].
Moosavi-Dezfooli, Seyed-Mohsen ;
Fawzi, Alhussein ;
Fawzi, Omar ;
Frossard, Pascal .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :86-94
[30]   DeepFool: a simple and accurate method to fool deep neural networks [J].
Moosavi-Dezfooli, Seyed-Mohsen ;
Fawzi, Alhussein ;
Frossard, Pascal .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :2574-2582