Adversarial analysis of similarity-based sign prediction

MT Godziszewski, M Waniek, Y Zhu, K Zhou… - Artificial Intelligence, 2024 - Elsevier
Adversarial social network analysis explores how social links can be altered or otherwise
manipulated to hinder unwanted information collection. To date, however, problems of this …

Black-box attacks against signed graph analysis via balance poisoning

J Zhou, Y Lai, J Ren, K Zhou - 2024 International Conference …, 2024 - ieeexplore.ieee.org
Signed graphs are well-suited for modeling social networks as they capture both positive
and negative relationships. Signed graph neural networks (SGNNs) are commonly …

Hiding from centrality measures: A Stackelberg game perspective

M Waniek, J Woźnica, K Zhou… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Centrality measures can rank nodes in a social network according to their importance.
However, in many cases, a node may want to avoid being highly ranked by such measures …

[PDF][PDF] Towards secrecy-aware attacks against trust prediction in signed graphs

Y Zhu, T Michalak, X Luo, K Zhou - arxiv preprint arxiv …, 2022 - researchgate.net
Signed graphs are widely used to model the trust relationships among users in security-
sensitive systems such as cryptocurrency trading platforms, where trust prediction plays a …

Adversarially Robust Signed Graph Contrastive Learning from Balance Augmentation

J Zhou, X Ai, Y Lai, K Zhou - arxiv preprint arxiv:2401.10590, 2024 - arxiv.org
Signed graphs consist of edges and signs, which can be separated into structural
information and balance-related information, respectively. Existing signed graph neural …

Human intuition as a defense against attribute inference

M Waniek, N Suri, A Zameek, B AlShebli, T Rahwan - Scientific reports, 2023 - nature.com
Attribute inference—the process of analyzing publicly available data in order to uncover
hidden information—has become a major threat to privacy, given the recent technological …

Uncovering Strong Ties: A Study of Indirect Sybil Attack on Signed Social Network

Y Bu, Y Zhu, L Geng, K Zhou - ICASSP 2024-2024 IEEE …, 2024 - ieeexplore.ieee.org
The Fairness and Goodness Algorithm (FGA) is a widely used trust system in signed
directed networks. However, attackers can manipulate trust scores on FGA by launching …

Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks

Y Zhu, T Michalak, X Luo, X Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Signed social networks are widely used to model the trust relationships among online users
in security-sensitive systems such as cryptocurrency trading platforms, where trust prediction …

Adversarial Link Prediction in Spatial Networks

M Godziszewski, Y Vorobeychik… - AAMAS Conference …, 2023 - par.nsf.gov
Social networks arise as a result of complex interactions among people, and homophily
plays an important role in this process. If we view homophily as a dominant force in network …

[PDF][PDF] On Security of Systems Built on Blockchains

T Lizurej - 2024 - mimuw.edu.pl
While the security of blockchains hinges on their underlying architecture, this thesis
emphasizes the necessity for a comprehensive analysis of various security aspects of …