File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Book Chapter: Network Embedding Attack: An Euclidean Distance Based Method

TitleNetwork Embedding Attack: An Euclidean Distance Based Method
Authors
KeywordsEuclidean distance attack
MDATA
Network embedding
Issue Date2021
Citation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021, v. 12647 LNCS, p. 131-151 How to Cite?
AbstractNetwork embedding methods are widely used in graph data mining. This chapter proposes a Genetic Algorithm (GA) based Euclidean Distance Attack strategy (EDA) to attack the DeepWalk-based network embedding to prevent certain structural information from being discovered. EDA disrupts the Euclidean distance between pairs of nodes in the embedding space by making a minimal modification of the network structure, thereby rendering downstream network algorithms ineffective, because a large number of network embedding based downstream algorithms, such as community detection and node classification, evaluate the similarity based on the Euclidean distance between nodes. Different from traditional attack strategies, EDA is an unsupervised network embedding attack method, which does not need labeling information. Experiments with a set of real networks demonstrate that the proposed EDA method can significantly reduce the performance of DeepWalk-based networking algorithms, outperforming other attack strategies in most cases. The results also indicate the transferability of the EDA method since it works well on attacking the network algorithms based on other network embedding methods such as High-Order Proximity preserved Embedding (HOPE) and non-embedding-based network algorithms such as Label Propagation Algorithm (LPA) and Eigenvectors of Matrices (EM).
Persistent Identifierhttp://hdl.handle.net/10722/330444
ISSN
2023 SCImago Journal Rankings: 0.606

 

DC FieldValueLanguage
dc.contributor.authorYu, Shanqing-
dc.contributor.authorZheng, Jun-
dc.contributor.authorWang, Yongqi-
dc.contributor.authorChen, Jinyin-
dc.contributor.authorXuan, Qi-
dc.contributor.authorZhang, Qingpeng-
dc.date.accessioned2023-09-05T12:10:41Z-
dc.date.available2023-09-05T12:10:41Z-
dc.date.issued2021-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021, v. 12647 LNCS, p. 131-151-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/330444-
dc.description.abstractNetwork embedding methods are widely used in graph data mining. This chapter proposes a Genetic Algorithm (GA) based Euclidean Distance Attack strategy (EDA) to attack the DeepWalk-based network embedding to prevent certain structural information from being discovered. EDA disrupts the Euclidean distance between pairs of nodes in the embedding space by making a minimal modification of the network structure, thereby rendering downstream network algorithms ineffective, because a large number of network embedding based downstream algorithms, such as community detection and node classification, evaluate the similarity based on the Euclidean distance between nodes. Different from traditional attack strategies, EDA is an unsupervised network embedding attack method, which does not need labeling information. Experiments with a set of real networks demonstrate that the proposed EDA method can significantly reduce the performance of DeepWalk-based networking algorithms, outperforming other attack strategies in most cases. The results also indicate the transferability of the EDA method since it works well on attacking the network algorithms based on other network embedding methods such as High-Order Proximity preserved Embedding (HOPE) and non-embedding-based network algorithms such as Label Propagation Algorithm (LPA) and Eigenvectors of Matrices (EM).-
dc.languageeng-
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.subjectEuclidean distance attack-
dc.subjectMDATA-
dc.subjectNetwork embedding-
dc.titleNetwork Embedding Attack: An Euclidean Distance Based Method-
dc.typeBook_Chapter-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-030-71590-8_8-
dc.identifier.scopuseid_2-s2.0-85102294261-
dc.identifier.volume12647 LNCS-
dc.identifier.spage131-
dc.identifier.epage151-
dc.identifier.eissn1611-3349-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats