Adversarial analysis of similarity-based sign prediction
Adversarial social network analysis explores how social links can be altered or otherwise
manipulated to hinder unwanted information collection. To date, however, problems of this …
manipulated to hinder unwanted information collection. To date, however, problems of this …
Black-box attacks against signed graph analysis via balance poisoning
Signed graphs are well-suited for modeling social networks as they capture both positive
and negative relationships. Signed graph neural networks (SGNNs) are commonly …
and negative relationships. Signed graph neural networks (SGNNs) are commonly …
Hiding from centrality measures: A Stackelberg game perspective
Centrality measures can rank nodes in a social network according to their importance.
However, in many cases, a node may want to avoid being highly ranked by such measures …
However, in many cases, a node may want to avoid being highly ranked by such measures …
[PDF][PDF] Towards secrecy-aware attacks against trust prediction in signed graphs
Signed graphs are widely used to model the trust relationships among users in security-
sensitive systems such as cryptocurrency trading platforms, where trust prediction plays a …
sensitive systems such as cryptocurrency trading platforms, where trust prediction plays a …
Adversarially Robust Signed Graph Contrastive Learning from Balance Augmentation
Signed graphs consist of edges and signs, which can be separated into structural
information and balance-related information, respectively. Existing signed graph neural …
information and balance-related information, respectively. Existing signed graph neural …
Human intuition as a defense against attribute inference
Attribute inference—the process of analyzing publicly available data in order to uncover
hidden information—has become a major threat to privacy, given the recent technological …
hidden information—has become a major threat to privacy, given the recent technological …
Uncovering Strong Ties: A Study of Indirect Sybil Attack on Signed Social Network
The Fairness and Goodness Algorithm (FGA) is a widely used trust system in signed
directed networks. However, attackers can manipulate trust scores on FGA by launching …
directed networks. However, attackers can manipulate trust scores on FGA by launching …
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks
Signed social networks are widely used to model the trust relationships among online users
in security-sensitive systems such as cryptocurrency trading platforms, where trust prediction …
in security-sensitive systems such as cryptocurrency trading platforms, where trust prediction …
Adversarial Link Prediction in Spatial Networks
Social networks arise as a result of complex interactions among people, and homophily
plays an important role in this process. If we view homophily as a dominant force in network …
plays an important role in this process. If we view homophily as a dominant force in network …
[PDF][PDF] On Security of Systems Built on Blockchains
T Lizurej - 2024 - mimuw.edu.pl
While the security of blockchains hinges on their underlying architecture, this thesis
emphasizes the necessity for a comprehensive analysis of various security aspects of …
emphasizes the necessity for a comprehensive analysis of various security aspects of …