Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/117912
PIRA download icon_1.1View/Download Full Text
Title: Unleashing the power of indirect attacks against trust prediction via preferential path
Authors: Bu, Y 
Zhu, Y
Geng, L 
Zhou, K 
Issue Date: Mar-2025
Source: Knowledge and information systems, Mar. 2025, v. 67, no. 5, p. 4459-4486
Abstract: Adversarial attacks in network security are a growing concern, prompting the need for innovative strategies to enhance both attack and defense mechanisms. This paper explores ways to improve adversarial attacks on the fairness and goodness algorithm (FGA) and review to reviewer (REV2), focusing on predicting trust within signed graphs. Unlike traditional time-based models, FGA and REV2 rely on iterative processes for trust propagation. By analyzing network structures, we identify strong ties and weak ties within FGA and discover preferential paths in REV2 that significantly impact information spread during algorithm iterations. Based on these insights, we propose a new approach called the vicinage attack, which enhances adversarial attacks by strategically targeting edges along these critical pathways. Our work highlights adversarial perturbation patterns that affect trust prediction on signed graphs and emphasizes their wide-reaching impact. These findings not only advance adversarial attack techniques but also deepen our understanding of trust propagation patterns. By clarifying the propagation bias in FGA and REV2, this research provides valuable insights for improving network security and developing better adversarial mitigation techniques in trust prediction.
Keywords: Adversarial attack
Discrete optimization
Network security
Signed social network
Trust system
Publisher: Springer UK
Journal: Knowledge and information systems 
ISSN: 0219-1377
EISSN: 0219-3116
DOI: 10.1007/s10115-024-02327-9
Rights: © The Author(s) 2025
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
The following publication Bu, Y., Zhu, Y., Geng, L. et al. Unleashing the power of indirect attacks against trust prediction via preferential path. Knowl Inf Syst 67, 4459–4486 (2025) is available at https://doi.org/10.1007/s10115-024-02327-9.
Appears in Collections:Journal/Magazine Article

Files in This Item:
File Description SizeFormat 
s10115-024-02327-9.pdf2.59 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show full item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.