2018
DOI: 10.48550/arxiv.1809.05912
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…They further proposed a neighborhood randomization mechanism to probabilistically randomize the destination of a link within a local neighborhood [51]. For link prediction, Yu et al [31] designed evolutionary perturbations based on genetic algorithm and estimation of distribution algorithm to degrade the popular link prediction method Resource Allocation Index (RA). And they found that although the evolutionary perturbations are designed to against RA, it is also effective against other link-prediction methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They further proposed a neighborhood randomization mechanism to probabilistically randomize the destination of a link within a local neighborhood [51]. For link prediction, Yu et al [31] designed evolutionary perturbations based on genetic algorithm and estimation of distribution algorithm to degrade the popular link prediction method Resource Allocation Index (RA). And they found that although the evolutionary perturbations are designed to against RA, it is also effective against other link-prediction methods.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the adversarial attacks against network algorithms also are carried out to study the robustness of network algorithms [28], [29], by rewiring a small number of links in the original network. Some even study on using the adversarial attack methods to solve privacy problems, that is, to protect certain sensitive information of the network from being leaked by graph mining methods [30], [31].…”
Section: Introductionmentioning
confidence: 99%
“…Link prediction, a classic network network analysis tool, is capable to benefit a wide range of real-world applications, such as, recommendation systems [23], [24], network reconstruction, etc [25]. In link prediction [26]- [29], Zheleva et al [26] proposed the link re-identification attack to predict sensitive links from the released data. Fard et al [27] introduced a subgraph-wise perturbation in directed networks to randomize the destination of a link within subgraphs to protect sensitive links.…”
Section: Introductionmentioning
confidence: 99%
“…They further proposed a neighborhood randomization mechanism to probabilistically randomize the destination of a link within a local neighborhood [28]. Yu et al [29] proposed a target defense strategy against linkprediction-based methods, which can protect target sensitive links from being detected by neighbor-based link prediction methods. In community detection, Nagaraja [30] proposed the first community deception method, called centrality attack, by adding links to the nodes of high centrality.…”
Section: Introductionmentioning
confidence: 99%
“…The authors also studied how a group of individuals could avoid being identified by community detection algorithms. Furthermore, Yu et al [28], Waniek et al [26], and Zhou et al [30] studied how to hide one's sensitive relationships from link prediction algorithms.…”
Section: Introductionmentioning
confidence: 99%