Blocking Adversarial Influence in Social Networks

11/02/2020
by   Feiran Jia, et al.
0

While social networks are widely used as a media for information diffusion, attackers can also strategically employ analytical tools, such as influence maximization, to maximize the spread of adversarial content through the networks. We investigate the problem of limiting the diffusion of negative information by blocking nodes and edges in the network. We formulate the interaction between the defender and the attacker as a Stackelberg game where the defender first chooses a set of nodes to block and then the attacker selects a set of seeds to spread negative information from. This yields an extremely complex bi-level optimization problem, particularly since even the standard influence measures are difficult to compute. Our approach is to approximate the attacker's problem as the maximum node domination problem. To solve this problem, we first develop a method based on integer programming combined with constraint generation. Next, to improve scalability, we develop an approximate solution method that represents the attacker's problem as an integer program, and then combines relaxation with duality to yield an upper bound on the defender's objective that can be computed using mixed integer linear programming. Finally, we propose an even more scalable heuristic method that prunes nodes from the consideration set based on their degree. Extensive experiments demonstrate the efficacy of our approaches.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/02/2022

Scalable Adversarial Attack Algorithms on Influence Maximization

In this paper, we study the adversarial attacks on influence maximizatio...
research
02/27/2023

Minimizing the Influence of Misinformation via Vertex Blocking

Information cascade in online social networks can be rather negative, e....
research
08/17/2023

Mitigating Misinformation Spreading in Social Networks Via Edge Blocking

The wide adoption of social media platforms has brought about numerous b...
research
07/26/2020

Robust Collective Classification against Structural Attacks

Collective learning methods exploit relations among data points to enhan...
research
02/21/2020

Green Security Game with Community Engagement

While game-theoretic models and algorithms have been developed to combat...
research
11/23/2017

Controlling Elections through Social Influence

Election control considers the problem of an adversary who attempts to t...
research
08/27/2023

Neural Influence Estimator: Towards Real-time Solutions to Influence Blocking Maximization

Real-time solutions to the influence blocking maximization (IBM) problem...

Please sign up or login with your details

Forgot password? Click here to reset