Proceedings of the Web Conference 2020 2020
DOI: 10.1145/3366423.3380171
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attack on Community Detection by Hiding Individuals

Abstract: It has been demonstrated that adversarial graphs, i.e., graphs with imperceptible perturbations added, can cause deep graph models to fail on node/graph classification tasks. In this paper, we extend adversarial graphs to the problem of community detection which is much more difficult. We focus on black-box attack and aim to hide targeted individuals from the detection of deep graph community detection models, which has many applications in real-world scenarios, for example, protecting personal privacy in soci… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 68 publications
(33 citation statements)
references
References 25 publications
0
33
0
Order By: Relevance
“…Wu et al [22] introduce integrated gradients that could guide the attack of perturbing certain features or edges while still benefiting from the parallel computations. Additionally, several heuristic methods are also proposed to poison the GNNs [1,8,16], revealing the vulnerability of GNNs in different graph analysis tasks. However, the adversarial patterns of attacks are less explored and the reasons of the success of attacks still remain unclear.…”
Section: Related Workmentioning
confidence: 99%
“…Wu et al [22] introduce integrated gradients that could guide the attack of perturbing certain features or edges while still benefiting from the parallel computations. Additionally, several heuristic methods are also proposed to poison the GNNs [1,8,16], revealing the vulnerability of GNNs in different graph analysis tasks. However, the adversarial patterns of attacks are less explored and the reasons of the success of attacks still remain unclear.…”
Section: Related Workmentioning
confidence: 99%
“…The community detection algorithms (CDAs) have been designed to unveil some essential insights, such as human interactions in social networks, 9,10 subject descriptions in information networks, 11,12 interaction between neurons, 13 the association among terrorists in the criminal network, 14,15 and so forth. Community identification tools raise multiple considerable privacy concerns.…”
Section: Introductionmentioning
confidence: 99%
“…They provided a residual entropy minimization formula for the deception of community structure in the network. Li et al 9 aimed to hide targeted nodes from the CDAs using the black‐box approach. They claimed that the generated adversarial graphs through their proposed approach can be transferred to other learning‐based community detection models.…”
Section: Introductionmentioning
confidence: 99%
“…From a Deep Graph Kernels framework that can learn latent representations inside a graph 24 or a variant of a convolutional network that encodes the local graph structure and the features of nodes 25 . Up to adversarial networks that make perturbations on the graph to generate constrained ones which are then classified into communities 26 or the extraction of temporal features using local long short-term memory networks to be used to learn spatio-temporal patterns to infer the communities 27 . Finally, the Graph Attention Networks provide a methodology based on convolutional networks, without depending or knowing the graph structure upfront 28 .…”
Section: Introductionmentioning
confidence: 99%