Skip to main content

Attacking Community Detectors: Mislead Detectors via Manipulating the Graph Structure

  • Conference paper
  • First Online:
Mobile Computing, Applications, and Services (MobiCASE 2021)

Abstract

Community detection has been widely studied from many different perspectives, which include heuristic approaches in the past and graph neural network in recent years. With increasing security and privacy concerns, community detectors have been demonstrated to be vulnerable. A slight perturbation to the graph data can greatly change the detection results. In this paper, we focus on dealing with a kind of attack on one of the communities by manipulating the graph structure. We formulate this case as target community problem. The big challenge to solve this problem is the universality on different detectors. For this, we define structural information gain (SIG) to guide the manipulation and design an attack algorithm named SIGM. We compare SIGM with some recent attacks on five graph datasets. Results show that our attack is effective on misleading community detector.

This paper is supported by National Natural Science Foundation of China No. 62172040, No. U1836212, No. 61872041.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://deim.urv.cat/~alexandre.arenas/data/welcome.htm.

  2. 2.

    http://snap.stanford.edu/data/.

  3. 3.

    https://paperswithcode.com/datasets?mod=graphs.

References

  1. Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. 2008(10), P10008 (2008)

    Article  Google Scholar 

  2. Bruna, J., Zaremba, W., Szlam, A., LeCun, Y.: Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203 (2013)

  3. Cai, Y., Zheng, H., Liu, J., Yan, B., Su, H., Liu, Y.: Balancing the pain and gain of hobnobbing: utility-based network building over atributed social networks. In: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, pp. 193–201 (2018)

    Google Scholar 

  4. Chen, L., et al.: A survey of adversarial learning on graphs. arXiv preprint arXiv:2003.05730 (2020)

  5. Chen, Q., Su, H., Liu, J., Yan, B., Zheng, H., Zhao, H.: In pursuit of social capital: upgrading social circle through edge rewiring. In: Shao, J., Yiu, M.L., Toyoda, M., Zhang, D., Wang, W., Cui, B. (eds.) APWeb-WAIM 2019. LNCS, vol. 11641, pp. 207–222. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26072-9_15

    Chapter  Google Scholar 

  6. Chen, Y., Liu, J.: Distributed community detection over blockchain networks based on structural entropy. In: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 3–12 (2019)

    Google Scholar 

  7. Chen, Z., Li, X., Bruna, J.: Supervised community detection with line graph neural networks. arXiv preprint arXiv:1705.08415 (2017)

  8. Clauset, A., Newman, M.E., Moore, C.: Finding community structure in very large networks. Phys. Rev. E 70(6), 066111 (2004)

    Article  Google Scholar 

  9. Ferrara, E., De Meo, P., Catanese, S., Fiumara, G.: Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 41(13), 5733–5750 (2014)

    Article  Google Scholar 

  10. Fionda, V., Pirro, G.: Community deception or: how to stop fearing community detection algorithms. IEEE Trans. Knowl. Data Eng. 30(4), 660–673 (2017)

    Article  Google Scholar 

  11. Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3–5), 75–174 (2010)

    Article  MathSciNet  Google Scholar 

  12. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  13. Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)

  14. Kuhn, H.W.: The hungarian method for the assignment problem. Naval Res. Logist. Q. 2(1–2), 83–97 (1955)

    Article  MathSciNet  Google Scholar 

  15. LeCun, Y., Bengio, Y., et al.: Convolutional networks for images, speech, and time series. Handb. Brain Theory Neural Netw. 3361(10), 1995 (1995)

    Google Scholar 

  16. Li, A., Li, J., Pan, Y.: Discovering natural communities in networks. Phys. A 436, 878–896 (2015)

    Article  Google Scholar 

  17. Li, A., et al.: Decoding topologically associating domains with ultra-low resolution hi-c data by graph structural entropy. Nat. Commun. 9(1), 3265 (2018)

    Article  Google Scholar 

  18. Li, J., Zhang, H., Han, Z., Rong, Y., Cheng, H., Huang, J.: Adversarial attack on community detection by hiding individuals. In: Proceedings of The Web Conference 2020, pp. 917–927 (2020)

    Google Scholar 

  19. Li, P.Z., Huang, L., Wang, C.D., Lai, J.H.: Edmot: an edge enhancement approach for motif-aware community detection. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 479–487 (2019)

    Google Scholar 

  20. Liu, J., Minnes, M.: Deciding the isomorphism problem in classes of unary automatic structures. Theoret. Comput. Sci. 412(18), 1705–1717 (2011)

    Article  MathSciNet  Google Scholar 

  21. Liu, J., Wei, Z.: Community detection based on graph dynamical systems with asynchronous runs. In: 2014 Second International Symposium on Computing and Networking, pp. 463–469. IEEE (2014)

    Google Scholar 

  22. Liu, Y., et al.: From local to global norm emergence: Dissolving self-reinforcing substructures with incremental social instruments. In: International Conference on Machine Learning, pp. 6871–6881. PMLR (2021)

    Google Scholar 

  23. Liu, Y., Liu, J., Zhang, Z., Zhu, L., Li, A.: Rem: from structural entropy to community structure deception. In: Advances in Neural Information Processing Systems, pp. 12938–12948 (2019)

    Google Scholar 

  24. Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th International Conference on World Wide Web, pp. 201–210 (2007)

    Google Scholar 

  25. Pons, P., Latapy, M.: Computing communities in large networks using random walks. In: Yolum, I., Güngör, T., Gürgen, F., Özturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 284–293. Springer, Heidelberg (2005). https://doi.org/10.1007/11569596_31

    Chapter  Google Scholar 

  26. Reichardt, J., Bornholdt, S.: Statistical mechanics of community detection. Phys. Rev. E 74(1), 016110 (2006)

    Article  MathSciNet  Google Scholar 

  27. Revelle, M., Domeniconi, C., Sweeney, M., Johri, A.: Finding community topics and membership in graphs. In: Appice, A., Rodrigues, P.P., Santos Costa, V., Gama, J., Jorge, A., Soares, C. (eds.) ECML PKDD 2015. LNCS (LNAI), vol. 9285, pp. 625–640. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23525-7_38

    Chapter  Google Scholar 

  28. Rosvall, M., Bergstrom, C.T.: Maps of random walks on complex networks reveal community structure. Proc. Natl. Acad. Sci. 105(4), 1118–1123 (2008)

    Article  Google Scholar 

  29. Rozemberczki, B., Davies, R., Sarkar, R., Sutton, C.: Gemsec: graph embedding with self clustering. In: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 65–72 (2019)

    Google Scholar 

  30. Sun, F.Y., Qu, M., Hoffmann, J., Huang, C.W., Tang, J.: vgraph: a generative model for joint community detection and node representation learning. In: Advances in Neural Information Processing Systems, pp. 514–524 (2019)

    Google Scholar 

  31. Tamersoy, A., Roundy, K., Chau, D.H.: Guilt by association: large scale malware detection by mining file-relation graphs. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1524–1533 (2014)

    Google Scholar 

  32. van Laarhoven, T., Marchiori, E.: Robust community detection methods with resolution parameter for complex detection in protein protein interaction networks. In: Shibuya, T., Kashima, H., Sese, J., Ahmad, S. (eds.) PRIB 2012. LNCS, vol. 7632, pp. 1–13. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34123-6_1

    Chapter  Google Scholar 

  33. Veličković, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)

  34. Von Luxburg, U.: A tutorial on spectral clustering. Stat. Comput. 17(4), 395–416 (2007)

    Article  MathSciNet  Google Scholar 

  35. Waniek, M., Michalak, T.P., Wooldridge, M.J., Rahwan, T.: Hiding individuals and communities in a social network. Nat. Hum. Behav. 2(2), 139–147 (2018)

    Article  Google Scholar 

  36. Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L.: Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610 (2019)

  37. Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32(1), 4–24 (2021)

    Google Scholar 

  38. Yan, B., Liu, Y., Liu, J., Cai, Y., Su, H., Zheng, H.: From the periphery to the center: information brokerage in an evolving network. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, pp. 3912–3918 (2018)

    Google Scholar 

  39. Zügner, D., Akbarnejad, A., Günnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847–2856 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zijian Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wan, K., Liu, J., Liu, Y., Zhang, Z., Khoussainov, B. (2022). Attacking Community Detectors: Mislead Detectors via Manipulating the Graph Structure. In: Deng, S., Zomaya, A., Li, N. (eds) Mobile Computing, Applications, and Services. MobiCASE 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 434. Springer, Cham. https://doi.org/10.1007/978-3-030-99203-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-99203-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-99202-6

  • Online ISBN: 978-3-030-99203-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics