ADMIRING: Adversarial Multi-Network Mining

被引:8
作者
Zhou, Qinghai [1 ]
Li, Liangyue [2 ]
Cao, Nan [3 ]
Ying, Lei [4 ]
Tong, Hanghang [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] Amazon, Seattle, WA USA
[3] Tongji Univ, Shanghai, Peoples R China
[4] Univ Michigan, Ann Arbor, MI 48109 USA
来源
2019 19TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2019) | 2019年
关键词
D O I
10.1109/ICDM.2019.00201
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-sourced networks naturally appear in many application domains, ranging from bioinformatics, social networks, neuroscience to management. Although state-of-the-art offers rich models and algorithms to find various patterns when input networks are given, it has largely remained nascent on how vulnerable the mining results are due to the adversarial attacks. In this paper, we address the problem of attacking multi-network mining through the way of deliberately perturbing the networks to alter the mining results. The key idea of the proposed method (ADMIRING) is effective influence functions on the Sylvester equation defined over the input networks, which plays a central and unifying role in various multi-network mining tasks. The proposed algorithms bear two main advantages, including (1) effectiveness, being able to accurately quantify the rate of change of the mining results in response to attacks; and (2) generality, being applicable to a variety of multi-network mining tasks (e.g., graph kernel, network alignment, cross-network node similarity) with different attacking strategies (e.g., edge/node removal, attribute alteration).
引用
收藏
页码:1522 / 1527
页数:6
相关论文
共 25 条
  • [11] SOLUTION OF THE SYLVESTER MATRIX EQUATION AXB(T)+CXD(T)=E
    GARDINER, JD
    LAUB, AJ
    AMATO, JJ
    MOLER, CB
    [J]. ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 1992, 18 (02): : 223 - 231
  • [12] Horvath Tamas, 2004, P 10 ACM SIGKDD INT, P158
  • [13] 1972 WALD LECTURE - ROBUST STATISTICS - REVIEW
    HUBER, PJ
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1972, 43 (04): : 1041 - &
  • [14] Kang J, 2018, IEEE INT CONF BIG DA, P713, DOI 10.1109/BigData.2018.8622563
  • [15] Derivation and validation of toxicophores for mutagenicity prediction
    Kazius, J
    McGuire, R
    Bursi, R
    [J]. JOURNAL OF MEDICINAL CHEMISTRY, 2005, 48 (01) : 312 - 320
  • [16] Li Bo, 2016, NIPS
  • [17] Li L, 2018, DEVICE CIRC SYST, P15
  • [18] Replacing the Irreplaceable: Fast Algorithms for Team Member Recommendation
    Li, Liangyue
    Tong, Hanghang
    Cao, Nan
    Ehrlich, Kate
    Lin, Yu-Ru
    Buchler, Norbou
    [J]. PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW 2015), 2015, : 636 - 646
  • [19] Inside the Atoms: Ranking on a Network of Networks
    Ni, Jingchao
    Tong, Hanghang
    Fan, Wei
    Zhang, Xiang
    [J]. PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 1356 - 1365
  • [20] Flexible and Robust Multi-Network Clustering
    Ni, Jingchao
    Tong, Hanghang
    Fan, Wei
    Zhang, Xiang
    [J]. KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2015, : 835 - 844