Adversarial Machine Learning on Social Network: A Survey

被引:5
|
作者
Guo, Sensen [1 ,2 ]
Li, Xiaoyu [1 ,2 ]
Mu, Zhiying [1 ,2 ]
机构
[1] Northwestern Polytech Univ Shenzhen, Res & Dev Inst, Shenzhen, Peoples R China
[2] Northwestern Polytech Univ, Sch Cybersecur, Xian, Peoples R China
基金
国家重点研发计划;
关键词
social networks; adversarial examples; sentiment analysis; recommendation system; spam detection; NEURAL-NETWORK; SPAM DETECTION; RECOMMENDATION MODEL; ROBUSTNESS; DYNAMICS; TRUST;
D O I
10.3389/fphy.2021.766540
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In recent years, machine learning technology has made great improvements in social networks applications such as social network recommendation systems, sentiment analysis, and text generation. However, it cannot be ignored that machine learning algorithms are vulnerable to adversarial examples, that is, adding perturbations that are imperceptible to the human eye to the original data can cause machine learning algorithms to make wrong outputs with high probability. This also restricts the widespread use of machine learning algorithms in real life. In this paper, we focus on adversarial machine learning algorithms on social networks in recent years from three aspects: sentiment analysis, recommendation system, and spam detection, We review some typical applications of machine learning algorithms and adversarial example generation and defense algorithms for machine learning algorithms in the above three aspects in recent years. besides, we also analyze the current research progress and prospects for the directions of future research.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I. V.
    Saenko, I. B.
    Lauta, O. S.
    Vasilev, N. A.
    Sadovnikov, V. E.
    PATTERN RECOGNITION AND IMAGE ANALYSIS, 2024, 34 (03) : 589 - 596
  • [42] Black-box Adversarial Machine Learning Attack on Network Traffic Classification
    Usama, Muhammad
    Qayyum, Adnan
    Qadir, Junaid
    Al-Fuqaha, Ala
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 84 - 89
  • [43] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    FUTURE INTERNET, 2023, 15 (02)
  • [44] Parallel Computing for Machine Learning in Social Network Analysis
    Cybenko, George
    2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 1464 - 1471
  • [45] Quantum generative adversarial network: A survey
    Li T.
    Zhang S.
    Xia J.
    Zhang, Shibin (cuitzsb@cuit.edu.cn), 1600, Tech Science Press (64): : 401 - 438
  • [46] Quantum Generative Adversarial Network: A Survey
    Li, Tong
    Zhang, Shibin
    Xia, Jinyue
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (01): : 401 - 438
  • [47] Adversarial Machine Learning in the Physical Domain
    Drenkow, Nathan G.
    Fendley, Neil M.
    Lennon, Max
    Burlina, Philippe M.
    Wang, I-Jeng
    Johns Hopkins APL Technical Digest (Applied Physics Laboratory), 2021, 35 (04): : 426 - 429
  • [48] Machine Learning it Adversarial RF Environments
    Roy, Debashri
    Mukherjee, Tathagata
    Chatterjee, Mainak
    IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (05) : 82 - 87
  • [49] Adversarial Machine Learning in the Physical Domain
    Drenkow, Nathan G.
    Fendley, Neil M.
    Lennon, Max
    Burlina, Philippe M.
    Wang, I-Jeng
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2021, 35 (04): : 426 - 429
  • [50] Adversarial attacks on medical machine learning
    Finlayson, Samuel G.
    Bowers, John D.
    Ito, Joichi
    Zittrain, Jonathan L.
    Beam, Andrew L.
    Kohane, Isaac S.
    SCIENCE, 2019, 363 (6433) : 1287 - 1289