File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-030-71590-8_8
- Scopus: eid_2-s2.0-85102294261
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Book Chapter: Network Embedding Attack: An Euclidean Distance Based Method
Title | Network Embedding Attack: An Euclidean Distance Based Method |
---|---|
Authors | |
Keywords | Euclidean distance attack MDATA Network embedding |
Issue Date | 2021 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021, v. 12647 LNCS, p. 131-151 How to Cite? |
Abstract | Network embedding methods are widely used in graph data mining. This chapter proposes a Genetic Algorithm (GA) based Euclidean Distance Attack strategy (EDA) to attack the DeepWalk-based network embedding to prevent certain structural information from being discovered. EDA disrupts the Euclidean distance between pairs of nodes in the embedding space by making a minimal modification of the network structure, thereby rendering downstream network algorithms ineffective, because a large number of network embedding based downstream algorithms, such as community detection and node classification, evaluate the similarity based on the Euclidean distance between nodes. Different from traditional attack strategies, EDA is an unsupervised network embedding attack method, which does not need labeling information. Experiments with a set of real networks demonstrate that the proposed EDA method can significantly reduce the performance of DeepWalk-based networking algorithms, outperforming other attack strategies in most cases. The results also indicate the transferability of the EDA method since it works well on attacking the network algorithms based on other network embedding methods such as High-Order Proximity preserved Embedding (HOPE) and non-embedding-based network algorithms such as Label Propagation Algorithm (LPA) and Eigenvectors of Matrices (EM). |
Persistent Identifier | http://hdl.handle.net/10722/330444 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Shanqing | - |
dc.contributor.author | Zheng, Jun | - |
dc.contributor.author | Wang, Yongqi | - |
dc.contributor.author | Chen, Jinyin | - |
dc.contributor.author | Xuan, Qi | - |
dc.contributor.author | Zhang, Qingpeng | - |
dc.date.accessioned | 2023-09-05T12:10:41Z | - |
dc.date.available | 2023-09-05T12:10:41Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021, v. 12647 LNCS, p. 131-151 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/330444 | - |
dc.description.abstract | Network embedding methods are widely used in graph data mining. This chapter proposes a Genetic Algorithm (GA) based Euclidean Distance Attack strategy (EDA) to attack the DeepWalk-based network embedding to prevent certain structural information from being discovered. EDA disrupts the Euclidean distance between pairs of nodes in the embedding space by making a minimal modification of the network structure, thereby rendering downstream network algorithms ineffective, because a large number of network embedding based downstream algorithms, such as community detection and node classification, evaluate the similarity based on the Euclidean distance between nodes. Different from traditional attack strategies, EDA is an unsupervised network embedding attack method, which does not need labeling information. Experiments with a set of real networks demonstrate that the proposed EDA method can significantly reduce the performance of DeepWalk-based networking algorithms, outperforming other attack strategies in most cases. The results also indicate the transferability of the EDA method since it works well on attacking the network algorithms based on other network embedding methods such as High-Order Proximity preserved Embedding (HOPE) and non-embedding-based network algorithms such as Label Propagation Algorithm (LPA) and Eigenvectors of Matrices (EM). | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject | Euclidean distance attack | - |
dc.subject | MDATA | - |
dc.subject | Network embedding | - |
dc.title | Network Embedding Attack: An Euclidean Distance Based Method | - |
dc.type | Book_Chapter | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-030-71590-8_8 | - |
dc.identifier.scopus | eid_2-s2.0-85102294261 | - |
dc.identifier.volume | 12647 LNCS | - |
dc.identifier.spage | 131 | - |
dc.identifier.epage | 151 | - |
dc.identifier.eissn | 1611-3349 | - |