Loading…

Adversarial perturbations to manipulate the perception of power and influence in networks

Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversari...

Full description

Saved in:
Bibliographic Details
Main Authors: Avram, Mihai Valentin, Mishra, Shubhanshu, Parulian, Nikolaus Nova, Diesner, Jana
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 994
container_issue
container_start_page 986
container_title
container_volume
creator Avram, Mihai Valentin
Mishra, Shubhanshu
Parulian, Nikolaus Nova
Diesner, Jana
description Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.
doi_str_mv 10.1145/3341161.3345026
format conference_proceeding
fullrecord <record><control><sourceid>acm_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9073185</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9073185</ieee_id><sourcerecordid>acm_books_10_1145_3341161_3345026</sourcerecordid><originalsourceid>FETCH-LOGICAL-a275t-c341b1543f8fbc3ddfbfab117c049421c7d786085c95c324a6ff1ee9c89749ae3</originalsourceid><addsrcrecordid>eNqNkL1PwzAQxQ0IiVI6M7B4ZEnxxXZij1XFl1SJBSSYLMc5C9M0iRyXiv-eVO3AyPRO99M73XuEXAObAwh5x7kAKGA-qmR5cUIuxy3jhSqUPiWTXJQ80xrez_6CCzIbhi_GWK4KxqSakI9F_Y1xsDHYhvYY0zZWNoWuHWjq6Ma2od82NiFNn7jnDvs9pZ2nfbfDSG1b09D6Zoutw3GiLaZdF9fDFTn3thlwdtQpeXu4f10-ZauXx-flYpXZvJQpc2OOCqTgXvnK8br2lbcVQOmY0CIHV9bl-KySTkvHc2EL7wFRO6VLoS3yKbk53A2IaPoYNjb-GM1KDkqOdH6g1m1M1XXrwQAz-wbNsUFzbNBUMaAfDbf_NPBfwytuSQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Adversarial perturbations to manipulate the perception of power and influence in networks</title><source>IEEE Xplore All Conference Series</source><creator>Avram, Mihai Valentin ; Mishra, Shubhanshu ; Parulian, Nikolaus Nova ; Diesner, Jana</creator><contributor>Chen, Wei ; Xiao, Xiaokui ; Spezzano, Francesca</contributor><creatorcontrib>Avram, Mihai Valentin ; Mishra, Shubhanshu ; Parulian, Nikolaus Nova ; Diesner, Jana ; Chen, Wei ; Xiao, Xiaokui ; Spezzano, Francesca</creatorcontrib><description>Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.</description><identifier>ISBN: 1450368689</identifier><identifier>ISBN: 9781450368681</identifier><identifier>EISSN: 2473-991X</identifier><identifier>EISBN: 1450368689</identifier><identifier>EISBN: 9781450368681</identifier><identifier>DOI: 10.1145/3341161.3345026</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Adversarial Attacks ; Centrality Measures ; Gallium nitride ; Human-centered computing ; Human-centered computing -- Human computer interaction (HCI) ; Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms ; Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction ; Machine learning ; Measurement ; Network Robustness ; Perturbation methods ; Robustness ; Security ; Social Network Analysis ; Social network services</subject><ispartof>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2019, p.986-994</ispartof><rights>2019 ACM</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9073185$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9073185$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><contributor>Chen, Wei</contributor><contributor>Xiao, Xiaokui</contributor><contributor>Spezzano, Francesca</contributor><creatorcontrib>Avram, Mihai Valentin</creatorcontrib><creatorcontrib>Mishra, Shubhanshu</creatorcontrib><creatorcontrib>Parulian, Nikolaus Nova</creatorcontrib><creatorcontrib>Diesner, Jana</creatorcontrib><title>Adversarial perturbations to manipulate the perception of power and influence in networks</title><title>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</title><addtitle>ASONAM</addtitle><description>Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.</description><subject>Adversarial Attacks</subject><subject>Centrality Measures</subject><subject>Gallium nitride</subject><subject>Human-centered computing</subject><subject>Human-centered computing -- Human computer interaction (HCI)</subject><subject>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms</subject><subject>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction</subject><subject>Machine learning</subject><subject>Measurement</subject><subject>Network Robustness</subject><subject>Perturbation methods</subject><subject>Robustness</subject><subject>Security</subject><subject>Social Network Analysis</subject><subject>Social network services</subject><issn>2473-991X</issn><isbn>1450368689</isbn><isbn>9781450368681</isbn><isbn>1450368689</isbn><isbn>9781450368681</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqNkL1PwzAQxQ0IiVI6M7B4ZEnxxXZij1XFl1SJBSSYLMc5C9M0iRyXiv-eVO3AyPRO99M73XuEXAObAwh5x7kAKGA-qmR5cUIuxy3jhSqUPiWTXJQ80xrez_6CCzIbhi_GWK4KxqSakI9F_Y1xsDHYhvYY0zZWNoWuHWjq6Ma2od82NiFNn7jnDvs9pZ2nfbfDSG1b09D6Zoutw3GiLaZdF9fDFTn3thlwdtQpeXu4f10-ZauXx-flYpXZvJQpc2OOCqTgXvnK8br2lbcVQOmY0CIHV9bl-KySTkvHc2EL7wFRO6VLoS3yKbk53A2IaPoYNjb-GM1KDkqOdH6g1m1M1XXrwQAz-wbNsUFzbNBUMaAfDbf_NPBfwytuSQ</recordid><startdate>20190827</startdate><enddate>20190827</enddate><creator>Avram, Mihai Valentin</creator><creator>Mishra, Shubhanshu</creator><creator>Parulian, Nikolaus Nova</creator><creator>Diesner, Jana</creator><general>ACM</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20190827</creationdate><title>Adversarial perturbations to manipulate the perception of power and influence in networks</title><author>Avram, Mihai Valentin ; Mishra, Shubhanshu ; Parulian, Nikolaus Nova ; Diesner, Jana</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a275t-c341b1543f8fbc3ddfbfab117c049421c7d786085c95c324a6ff1ee9c89749ae3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Adversarial Attacks</topic><topic>Centrality Measures</topic><topic>Gallium nitride</topic><topic>Human-centered computing</topic><topic>Human-centered computing -- Human computer interaction (HCI)</topic><topic>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms</topic><topic>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction</topic><topic>Machine learning</topic><topic>Measurement</topic><topic>Network Robustness</topic><topic>Perturbation methods</topic><topic>Robustness</topic><topic>Security</topic><topic>Social Network Analysis</topic><topic>Social network services</topic><toplevel>online_resources</toplevel><creatorcontrib>Avram, Mihai Valentin</creatorcontrib><creatorcontrib>Mishra, Shubhanshu</creatorcontrib><creatorcontrib>Parulian, Nikolaus Nova</creatorcontrib><creatorcontrib>Diesner, Jana</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Avram, Mihai Valentin</au><au>Mishra, Shubhanshu</au><au>Parulian, Nikolaus Nova</au><au>Diesner, Jana</au><au>Chen, Wei</au><au>Xiao, Xiaokui</au><au>Spezzano, Francesca</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Adversarial perturbations to manipulate the perception of power and influence in networks</atitle><btitle>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</btitle><stitle>ASONAM</stitle><date>2019-08-27</date><risdate>2019</risdate><spage>986</spage><epage>994</epage><pages>986-994</pages><eissn>2473-991X</eissn><isbn>1450368689</isbn><isbn>9781450368681</isbn><eisbn>1450368689</eisbn><eisbn>9781450368681</eisbn><abstract>Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3341161.3345026</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1450368689
ispartof 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2019, p.986-994
issn 2473-991X
language eng
recordid cdi_ieee_primary_9073185
source IEEE Xplore All Conference Series
subjects Adversarial Attacks
Centrality Measures
Gallium nitride
Human-centered computing
Human-centered computing -- Human computer interaction (HCI)
Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms
Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction
Machine learning
Measurement
Network Robustness
Perturbation methods
Robustness
Security
Social Network Analysis
Social network services
title Adversarial perturbations to manipulate the perception of power and influence in networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T01%3A06%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Adversarial%20perturbations%20to%20manipulate%20the%20perception%20of%20power%20and%20influence%20in%20networks&rft.btitle=2019%20IEEE/ACM%20International%20Conference%20on%20Advances%20in%20Social%20Networks%20Analysis%20and%20Mining%20(ASONAM)&rft.au=Avram,%20Mihai%20Valentin&rft.date=2019-08-27&rft.spage=986&rft.epage=994&rft.pages=986-994&rft.eissn=2473-991X&rft.isbn=1450368689&rft.isbn_list=9781450368681&rft_id=info:doi/10.1145/3341161.3345026&rft.eisbn=1450368689&rft.eisbn_list=9781450368681&rft_dat=%3Cacm_CHZPO%3Eacm_books_10_1145_3341161_3345026%3C/acm_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a275t-c341b1543f8fbc3ddfbfab117c049421c7d786085c95c324a6ff1ee9c89749ae3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9073185&rfr_iscdi=true