Loading…
Adversarial perturbations to manipulate the perception of power and influence in networks
Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversari...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 994 |
container_issue | |
container_start_page | 986 |
container_title | |
container_volume | |
creator | Avram, Mihai Valentin Mishra, Shubhanshu Parulian, Nikolaus Nova Diesner, Jana |
description | Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security. |
doi_str_mv | 10.1145/3341161.3345026 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>acm_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9073185</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9073185</ieee_id><sourcerecordid>acm_books_10_1145_3341161_3345026</sourcerecordid><originalsourceid>FETCH-LOGICAL-a275t-c341b1543f8fbc3ddfbfab117c049421c7d786085c95c324a6ff1ee9c89749ae3</originalsourceid><addsrcrecordid>eNqNkL1PwzAQxQ0IiVI6M7B4ZEnxxXZij1XFl1SJBSSYLMc5C9M0iRyXiv-eVO3AyPRO99M73XuEXAObAwh5x7kAKGA-qmR5cUIuxy3jhSqUPiWTXJQ80xrez_6CCzIbhi_GWK4KxqSakI9F_Y1xsDHYhvYY0zZWNoWuHWjq6Ma2od82NiFNn7jnDvs9pZ2nfbfDSG1b09D6Zoutw3GiLaZdF9fDFTn3thlwdtQpeXu4f10-ZauXx-flYpXZvJQpc2OOCqTgXvnK8br2lbcVQOmY0CIHV9bl-KySTkvHc2EL7wFRO6VLoS3yKbk53A2IaPoYNjb-GM1KDkqOdH6g1m1M1XXrwQAz-wbNsUFzbNBUMaAfDbf_NPBfwytuSQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Adversarial perturbations to manipulate the perception of power and influence in networks</title><source>IEEE Xplore All Conference Series</source><creator>Avram, Mihai Valentin ; Mishra, Shubhanshu ; Parulian, Nikolaus Nova ; Diesner, Jana</creator><contributor>Chen, Wei ; Xiao, Xiaokui ; Spezzano, Francesca</contributor><creatorcontrib>Avram, Mihai Valentin ; Mishra, Shubhanshu ; Parulian, Nikolaus Nova ; Diesner, Jana ; Chen, Wei ; Xiao, Xiaokui ; Spezzano, Francesca</creatorcontrib><description>Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.</description><identifier>ISBN: 1450368689</identifier><identifier>ISBN: 9781450368681</identifier><identifier>EISSN: 2473-991X</identifier><identifier>EISBN: 1450368689</identifier><identifier>EISBN: 9781450368681</identifier><identifier>DOI: 10.1145/3341161.3345026</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Adversarial Attacks ; Centrality Measures ; Gallium nitride ; Human-centered computing ; Human-centered computing -- Human computer interaction (HCI) ; Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms ; Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction ; Machine learning ; Measurement ; Network Robustness ; Perturbation methods ; Robustness ; Security ; Social Network Analysis ; Social network services</subject><ispartof>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2019, p.986-994</ispartof><rights>2019 ACM</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9073185$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9073185$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><contributor>Chen, Wei</contributor><contributor>Xiao, Xiaokui</contributor><contributor>Spezzano, Francesca</contributor><creatorcontrib>Avram, Mihai Valentin</creatorcontrib><creatorcontrib>Mishra, Shubhanshu</creatorcontrib><creatorcontrib>Parulian, Nikolaus Nova</creatorcontrib><creatorcontrib>Diesner, Jana</creatorcontrib><title>Adversarial perturbations to manipulate the perception of power and influence in networks</title><title>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</title><addtitle>ASONAM</addtitle><description>Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.</description><subject>Adversarial Attacks</subject><subject>Centrality Measures</subject><subject>Gallium nitride</subject><subject>Human-centered computing</subject><subject>Human-centered computing -- Human computer interaction (HCI)</subject><subject>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms</subject><subject>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction</subject><subject>Machine learning</subject><subject>Measurement</subject><subject>Network Robustness</subject><subject>Perturbation methods</subject><subject>Robustness</subject><subject>Security</subject><subject>Social Network Analysis</subject><subject>Social network services</subject><issn>2473-991X</issn><isbn>1450368689</isbn><isbn>9781450368681</isbn><isbn>1450368689</isbn><isbn>9781450368681</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqNkL1PwzAQxQ0IiVI6M7B4ZEnxxXZij1XFl1SJBSSYLMc5C9M0iRyXiv-eVO3AyPRO99M73XuEXAObAwh5x7kAKGA-qmR5cUIuxy3jhSqUPiWTXJQ80xrez_6CCzIbhi_GWK4KxqSakI9F_Y1xsDHYhvYY0zZWNoWuHWjq6Ma2od82NiFNn7jnDvs9pZ2nfbfDSG1b09D6Zoutw3GiLaZdF9fDFTn3thlwdtQpeXu4f10-ZauXx-flYpXZvJQpc2OOCqTgXvnK8br2lbcVQOmY0CIHV9bl-KySTkvHc2EL7wFRO6VLoS3yKbk53A2IaPoYNjb-GM1KDkqOdH6g1m1M1XXrwQAz-wbNsUFzbNBUMaAfDbf_NPBfwytuSQ</recordid><startdate>20190827</startdate><enddate>20190827</enddate><creator>Avram, Mihai Valentin</creator><creator>Mishra, Shubhanshu</creator><creator>Parulian, Nikolaus Nova</creator><creator>Diesner, Jana</creator><general>ACM</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20190827</creationdate><title>Adversarial perturbations to manipulate the perception of power and influence in networks</title><author>Avram, Mihai Valentin ; Mishra, Shubhanshu ; Parulian, Nikolaus Nova ; Diesner, Jana</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a275t-c341b1543f8fbc3ddfbfab117c049421c7d786085c95c324a6ff1ee9c89749ae3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Adversarial Attacks</topic><topic>Centrality Measures</topic><topic>Gallium nitride</topic><topic>Human-centered computing</topic><topic>Human-centered computing -- Human computer interaction (HCI)</topic><topic>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms</topic><topic>Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction</topic><topic>Machine learning</topic><topic>Measurement</topic><topic>Network Robustness</topic><topic>Perturbation methods</topic><topic>Robustness</topic><topic>Security</topic><topic>Social Network Analysis</topic><topic>Social network services</topic><toplevel>online_resources</toplevel><creatorcontrib>Avram, Mihai Valentin</creatorcontrib><creatorcontrib>Mishra, Shubhanshu</creatorcontrib><creatorcontrib>Parulian, Nikolaus Nova</creatorcontrib><creatorcontrib>Diesner, Jana</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Avram, Mihai Valentin</au><au>Mishra, Shubhanshu</au><au>Parulian, Nikolaus Nova</au><au>Diesner, Jana</au><au>Chen, Wei</au><au>Xiao, Xiaokui</au><au>Spezzano, Francesca</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Adversarial perturbations to manipulate the perception of power and influence in networks</atitle><btitle>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</btitle><stitle>ASONAM</stitle><date>2019-08-27</date><risdate>2019</risdate><spage>986</spage><epage>994</epage><pages>986-994</pages><eissn>2473-991X</eissn><isbn>1450368689</isbn><isbn>9781450368681</isbn><eisbn>1450368689</eisbn><eisbn>9781450368681</eisbn><abstract>Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3341161.3345026</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1450368689 |
ispartof | 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2019, p.986-994 |
issn | 2473-991X |
language | eng |
recordid | cdi_ieee_primary_9073185 |
source | IEEE Xplore All Conference Series |
subjects | Adversarial Attacks Centrality Measures Gallium nitride Human-centered computing Human-centered computing -- Human computer interaction (HCI) Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms Human-centered computing -- Human computer interaction (HCI) -- Interaction paradigms -- Web-based interaction Machine learning Measurement Network Robustness Perturbation methods Robustness Security Social Network Analysis Social network services |
title | Adversarial perturbations to manipulate the perception of power and influence in networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T01%3A06%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Adversarial%20perturbations%20to%20manipulate%20the%20perception%20of%20power%20and%20influence%20in%20networks&rft.btitle=2019%20IEEE/ACM%20International%20Conference%20on%20Advances%20in%20Social%20Networks%20Analysis%20and%20Mining%20(ASONAM)&rft.au=Avram,%20Mihai%20Valentin&rft.date=2019-08-27&rft.spage=986&rft.epage=994&rft.pages=986-994&rft.eissn=2473-991X&rft.isbn=1450368689&rft.isbn_list=9781450368681&rft_id=info:doi/10.1145/3341161.3345026&rft.eisbn=1450368689&rft.eisbn_list=9781450368681&rft_dat=%3Cacm_CHZPO%3Eacm_books_10_1145_3341161_3345026%3C/acm_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a275t-c341b1543f8fbc3ddfbfab117c049421c7d786085c95c324a6ff1ee9c89749ae3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9073185&rfr_iscdi=true |