2018
DOI: 10.48550/arxiv.1809.00152
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network

Marcin Waniek,
Kai Zhou,
Yevgeniy Vorobeychik
et al.

Abstract: Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Fionda et al propose a novel community deception method based on the safeness [47]. In link prediction, Waniek et al propose two strategies called closed-triad-removal and open-triad-creation [48], which solve the privacy problem caused by link prediction methods. Zhou et al propose a method to attack local similarity and global similarity by deleting edges [49].…”
Section: Graph Attack Methodsmentioning
confidence: 99%
“…Fionda et al propose a novel community deception method based on the safeness [47]. In link prediction, Waniek et al propose two strategies called closed-triad-removal and open-triad-creation [48], which solve the privacy problem caused by link prediction methods. Zhou et al propose a method to attack local similarity and global similarity by deleting edges [49].…”
Section: Graph Attack Methodsmentioning
confidence: 99%
“…Link-relevant task Link prediction is another fundamental research problems in network analysis. In this scenario, [68] studies the link connections, and propose heuristic algorithms to evade the detection by rewiring operations. Furthermore, [9] puts forward a novel iterative gradient attack method based on a graph auto-encoder framework.…”
Section: Major Contributionsmentioning
confidence: 99%