作者
Qinghai Zhou, Liangyue Li, Nan Cao, Lei Ying, Hanghang Tong
发表日期
2019/11/8
研讨会论文
2019 IEEE International Conference on Data Mining (ICDM)
页码范围
1522-1527
出版商
IEEE
简介
Multi-sourced networks naturally appear in many application domains, ranging from bioinformatics, social networks, neuroscience to management. Although state-of-the-art offers rich models and algorithms to find various patterns when input networks are given, it has largely remained nascent on how vulnerable the mining results are due to the adversarial attacks. In this paper, we address the problem of attacking multi-network mining through the way of deliberately perturbing the networks to alter the mining results. The key idea of the proposed method (Admiring) is effective influence functions on the Sylvester equation defined over the input networks, which plays a central and unifying role in various multi-network mining tasks. The proposed algorithms bear two main advantages, including (1) effectiveness, being able to accurately quantify the rate of change of the mining results in response to attacks; and (2 …
引用总数
20212022202320248444
学术搜索中的文章
Q Zhou, L Li, N Cao, L Ying, H Tong - 2019 IEEE International Conference on Data Mining …, 2019