Abstract
Considering the wide application of network embedding methods in graph data mining, inspired by adversarial attacks in deep learning, a genetic algorithm-based Euclidean distance attack strategy is proposed to attack the network embedding method, thereby preventing structure information being discovered. EDA focuses on disturbing the Euclidean distance between a pair of nodes in the embedding space as much as possible through minimal modifications of the network structure. Since many downstream network algorithms, such as community detection and node classification, rely on the Euclidean distance between nodes to evaluate their similarity in the embedded space, EDA can be regarded as a general attack on various network algorithms. Different from traditional supervised attack strategies, EDA does not need labeling information, it is an unsupervised network embedding attack method. Experiments on a set of real networks demonstrate that the proposed EDA method can significantly reduce the performance of DeepWalk-based networking algorithms, i.e., community detection and node classification, and its performance is superior to several heuristic attack strategies.
| Original language | English |
|---|---|
| Title of host publication | 2020 IEEE Fifth International Conference on Data Science in Cyberspace |
| Subtitle of host publication | Proceedings |
| Publisher | IEEE |
| Pages | 71-77 |
| ISBN (Electronic) | 978-1-7281-9558-2 |
| ISBN (Print) | 978-1-7281-9559-9 |
| DOIs | |
| Publication status | Published - Jul 2020 |
| Event | 5th IEEE International Conference on Data Science in Cyberspace, DSC 2020 - Virtual, Hong Kong, China Duration: 27 Jul 2020 → 29 Jul 2020 https://www4.comp.polyu.edu.hk/~icdsc2020/index.html |
Publication series
| Name | Proceedings - IEEE International Conference on Data Science in Cyberspace, DSC |
|---|
Conference
| Conference | 5th IEEE International Conference on Data Science in Cyberspace, DSC 2020 |
|---|---|
| Place | Hong Kong, China |
| Period | 27/07/20 → 29/07/20 |
| Internet address |
Bibliographical note
Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).Research Keywords
- Adversarial attack
- Euclidean distance
- Network algorithm
- Network embedding
- Unsupervised learning