Adversarial perturbations to manipulate the perception of power and influence in networks

Mihai Valentin Avram, Shubhanshu Mishra, Nikolaus Nova Parulian, Jana Diesner

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality metrics. Our work is motivated by recent research on the investigation and design of adversarial attacks on machine learning systems. We apply the concept of adversarial attacks to social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of nodes according to centrality measures. This can represent the attempts of an adversary to boost or demote the degree to which others perceive them as influential or powerful. It also allows us to study the impact of adversarial attacks on targets and victims, and to design metrics and security measures that help to identify and mitigate adversarial network attacks. We conduct a series of experiments on synthetic network data to identify attacks that allow the adversarial node to achieve their objective with a single move. We test this approach on different common network topologies and for common centrality metrics. We find that there is a small set of moves that result in the adversary achieving their objective, and this set is smaller for decreasing centrality metrics than for increasing them. These results can help with assessing the robustness of centrality measures. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and improving network security.

Original languageEnglish (US)
Title of host publicationProceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019
EditorsFrancesca Spezzano, Wei Chen, Xiaokui Xiao
PublisherAssociation for Computing Machinery, Inc
Pages986-994
Number of pages9
ISBN (Electronic)9781450368681
DOIs
StatePublished - Aug 27 2019
Event11th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019 - Vancouver, Canada
Duration: Aug 27 2019Aug 30 2019

Publication series

NameProceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019

Conference

Conference11th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019
Country/TerritoryCanada
CityVancouver
Period8/27/198/30/19

Keywords

  • Adversarial attacks
  • Centrality measures
  • Network robustness
  • Social network analysis

ASJC Scopus subject areas

  • Communication
  • Computer Networks and Communications
  • Information Systems and Management
  • Sociology and Political Science

Fingerprint

Dive into the research topics of 'Adversarial perturbations to manipulate the perception of power and influence in networks'. Together they form a unique fingerprint.

Cite this