Processing math: 100%
A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks | IEEE Journals & Magazine | IEEE Xplore

A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks


Abstract:

Social status, the social influence of a user, plays an important role in many real-world applications, e.g., trust relations and information propagation in a social netw...Show More

Abstract:

Social status, the social influence of a user, plays an important role in many real-world applications, e.g., trust relations and information propagation in a social network. In this paper, we reveal the possibility of falsifying social status through adversarial attacks in graph neural networks (GNNs). Different from neural networks in the visual or speech domain, GNNs take the attributes of nodes and edges in a graph as features. To cater to the characteristics of GNNs, \vphantom {_{\int }} we design a new paradigm of adversarial example attack, named A^{2} S^{2} - GNN ( \mathbf {GNN} -based \mathbf {A} dversarial \mathbf {A} ttacks on \mathbf {S} ocial \mathbf {S} tatus), aiming at manipulating the social status of a target node in social networks. The key idea is to establish relationships or break relationships between a set of compromised nodes and the target node. More specifically, we consider a signed directed graph representing complicated positive/negative asymmetric relationships between nodes. We design an efficient adversarial attack algorithm to determine the minimum set of signed links that should be created or deleted to reach the attack objective. We conduct extensive experiments on baseline datasets. Compared with the benchmark algorithms, A^{2} S^{2} - GNN can effectively promote or vilify the social status of the target node up to 89.36% and 192.38%, respectively, while keeping the modification to the social network to the minimum. Furthermore, the experimental results on six status evaluating algorithms verify the transferability of our proposed attack algorithm.
Page(s): 206 - 220
Date of Publication: 03 November 2022

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.