A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks

Xiaoyan Yin,Wanyu Lin,Kexin Sun,Chun Wei,Yanjiao Chen
DOI: https://doi.org/10.1109/tifs.2022.3219342
IF: 7.231
2023-01-01
IEEE Transactions on Information Forensics and Security
Abstract:Social status, the social influence of a user, plays an important role in many real-world applications, e.g., trust relations and information propagation in a social network. In this paper, we reveal the possibility of falsifying social status through adversarial attacks in graph neural networks (GNNs). Different from neural networks in the visual or speech domain, GNNs take the attributes of nodes and edges in a graph as features. To cater to the characteristics of GNNs, $\vphantom {_{\int }}$ we design a new paradigm of adversarial example attack, named $A^{2} S^{2}$ - GNN ( $\mathbf {GNN}$ -based $\mathbf {A}$ dversarial $\mathbf {A}$ ttacks on $\mathbf {S}$ ocial $\mathbf {S}$ tatus), aiming at manipulating the social status of a target node in social networks. The key idea is to establish relationships or break relationships between a set of compromised nodes and the target node. More specifically, we consider a signed directed graph representing complicated positive/negative asymmetric relationships between nodes. We design an efficient adversarial attack algorithm to determine the minimum set of signed links that should be created or deleted to reach the attack objective. We conduct extensive experiments on baseline datasets. Compared with the benchmark algorithms, $A^{2} S^{2}$ - GNN can effectively promote or vilify the social status of the target node up to 89.36% and 192.38%, respectively, while keeping the modification to the social network to the minimum. Furthermore, the experimental results on six status evaluating algorithms verify the transferability of our proposed attack algorithm.
What problem does this paper attempt to address?