Adversarial link deception against the link prediction in complex networks

被引:2
作者
Jiang, Zhongyuan [1 ,3 ]
Tang, Xiaoke [2 ]
Zeng, Yong [1 ,3 ]
Li, Jinku [1 ,3 ]
Ma, Jianfeng [1 ,3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Beijing Smart Chip Microelect Technol Co Ltd, State Grid Key Lab Power Ind Chip Design & Anal T, Beijing 102200, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Linking deception; Link prediction; Link addition; Complex network; SYSTEMS; MODEL;
D O I
10.1016/j.physa.2021.126074
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Currently, the link prediction tool has been extensively used in kinds of complex networks for the use of friend, commodity, or service recommendations. However, many adversaries may maliciously or intentionally perturb a part of social links to deceive the link prediction method to suggest some unexpected missing links (referred to as targets) to users. In this work, from the attacker perspective, we propose to promote the prediction probability of given targets via adding a tiny number of new links into the network to deceive the common neighbor based link prediction method. We first define the link deception process as a similarity score maximizing problem. Secondly, we propose to use a greedy algorithm referred to as GreedyAdd to greedily adding a budget limited number of links into the network. Thirdly, considering the high time complexity of the GreedyAdd, we propose a heuristic link addition method referred to as HeuristicAdd to improve the computing efficiency. Finally, we do experiments on many real social graphs to confirm the effectiveness and efficiency of the HeuristicAdd method. The results show that the HeuristicAdd algorithm can mostly deceive the link prediction with less time consumptions than the GreedyAdd. This work considers the security problem of complex systems from a new perspective and has potential applications. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:8
相关论文
共 30 条
  • [1] Friends and neighbors on the Web
    Adamic, LA
    Adar, E
    [J]. SOCIAL NETWORKS, 2003, 25 (03) : 211 - 230
  • [2] Error and attack tolerance of complex networks
    Albert, R
    Jeong, H
    Barabási, AL
    [J]. NATURE, 2000, 406 (6794) : 378 - 382
  • [3] Robustness of Interdependent Power Grids and Communication Networks: A Complex Network Perspective
    Chen, Zhenhao
    Wu, Jiajing
    Xia, Yongxiang
    Zhang, Xi
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2018, 65 (01) : 115 - 119
  • [4] Bounded link prediction in very large networks
    Cui, Wei
    Pu, Cunlai
    Xu, Zhongqi
    Cai, Shimin
    Yang, Jian
    Michaelson, Andrew
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 457 : 202 - 214
  • [5] Debruyne R, 1997, INT JOINT CONF ARTIF, P412
  • [7] The networked evolutionary algorithm: A network science perspective
    Du, Wenbo
    Zhang, Mingyuan
    Ying, Wen
    Perc, Matjaz
    Tang, Ke
    Cao, Xianbin
    Wu, Dapeng
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2018, 338 : 33 - 43
  • [8] Recommender Systems for Large-Scale Social Networks: A review of challenges and solutions
    Eirinaki, Magdalini
    Gao, Jerry
    Varlamis, Iraklis
    Tserpes, Konstantinos
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 413 - 418
  • [9] Community Deception or: How to Stop Fearing Community Detection Algorithms
    Fionda, Valeria
    Pirro, Giuseppe
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (04) : 660 - 673
  • [10] Glattfelder J., 2010, THESIS ETH ZURICH