4.6 Article

Multiscale Evolutionary Perturbation Attack on Community Detection

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSS.2020.3031596

Keywords

Community deception; community detection; genetic algorithm (GA); privacy protection; social network

Funding

  1. National Natural Science Foundation of China [61502423, 61973273, 61572439, 62072406]
  2. Zhejiang Provincial Natural Science Foundation of China [LR19F030001, LY19F020025]
  3. Zhejiang Science and Technology Plan Project [LGF18F030009]
  4. Major Special Funding for Science and Technology Innovation 2025 in Ningbo [2018B10063]
  5. Ministry of Public Security's Research Project Research and Demonstration Application of Key Technologies of Criminal Social Network Model

Ask authors/readers for more resources

This article discusses the issue of community detection attacks and proposes the evolutionary perturbation attack (EPA) method, which successfully attacks network community algorithms at different scales, showing better performance than baseline attack methods.
Community detection, aiming to group nodes based on their connections, plays an important role in network analysis since communities, treated as meta-nodes, allow us to create a large-scale map of a network to simplify its analysis. However, for privacy reasons, we may want to prevent communities from being discovered in certain cases, leading to the topics on community deception. In this article, we formalize this community detection attack problem in three scales, including global attack (macroscale), target community attack (mesoscale), and target node attack (microscale). We treat this as an optimization problem and further propose a novel evolutionary perturbation attack (EPA) method, where we generate adversarial networks to realize the community detection attack. Numerical experiments validate that our EPA can successfully attack network community algorithms in all three scales, i.e., hide target nodes or communities and further disturb the community structure of the whole network by only changing a small fraction of links. By comparison, our EPA behaves better than a number of baseline attack methods on six synthetic networks and three real-world networks. More interestingly, although our EPA is based on the Louvain algorithm, it is also effective in attacking other community detection algorithms, validating its good transferability.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available