Attacking shortest paths by cutting edges

BA Miller, Z Shafi, W Ruml, Y Vorobeychik… - ACM Transactions on …, 2023 - dl.acm.org
Identifying shortest paths between nodes in a network is a common graph analysis problem
that is important for many applications involving routing of resources. An adversary that can …

Alternative route-based attacks in metropolitan traffic systems

S La Fontaine, N Muralidhar, M Clifford… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
With the growing reliance on driving direction applications that dynamically account for live
traffic updates, drivers are much more likely to act optimally, by taking the shortest path to …

Towards explainable road navigation systems

K Alsheeb, M Brandão - 2023 IEEE 26th International …, 2023 - ieeexplore.ieee.org
Road navigation systems are important systems for pedestrians, drivers, and autonomous
vehicles. Routes provided by such systems can be unintuitive, and may not contribute to an …

Defense Against Shortest Path Attacks

BA Miller, Z Shafi, W Ruml, Y Vorobeychik… - arxiv preprint arxiv …, 2023 - arxiv.org
Identifying shortest paths between nodes in a network is an important task in applications
involving routing of resources. Recent work has shown that a malicious actor can …

Graph-Based Temporal Process Planning and Scheduling for Well Drilling Operations

M Pavlov, N Bukhanov, S Safonov - SPE Middle East Oil and Gas …, 2023 - onepetro.org
Well construction is the most expensive stage of oil field development. Oil and gas
companies carefully calculate all possible expenditures to assure that the project of well …

Network Design Through Graph Neural Networks: Identifying Challenges and Improving Performance

D Loveland, R Caceres - … Conference on Complex Networks and Their …, 2023 - Springer
Abstract Graph Neural Network (GNN) research has produced strategies to modify a graph's
edges using gradients from a trained GNN, with the goal of network design. However, the …

图深度学**攻击模型综述

任一支, **泽龙, 袁理锋, 张祯, 朱娅妮, 吴国华 - 信息安全学报, 2022 - jcs.iie.ac.cn
**年来, 图深度学**模型面临的安全威胁日益严重, 相关研究表明, 推荐系统中恶意用户可以通过
诋毁, 女巫攻击等攻击手段轻易地对系统进行欺骗. 本文对现有基于图深度学**攻击工作进行 …

Check for Network Design Through Graph Neural Networks: Identifying Challenges and Improving Performance Donald Loveland¹ () and Rajmonda Caceres²

D Loveland¹, R Caceres - … & Their Applications XII: Proceedings of …, 2024 - books.google.com
Graph Neural Network (GNN) research has produced strategies to modify a graph's edges
using gradients from a trained GNN, with the goal of network design. However, the factors …

Optimal Edge Weight Perturbations to Attack Shortest Paths

BA Miller, Z Shafi, W Ruml, Y Vorobeychik… - arxiv preprint arxiv …, 2021 - arxiv.org
Finding shortest paths in a given network (eg, a computer network or a road network) is a
well-studied task with many applications. We consider this task under the presence of an …