Social networks are frequently polluted by rumors, which can be detected by advanced models such as graph neural networks. However, the models are vulnerable to attacks and understanding the vulnerabilities is critical to rumor detection in practice. To discover subtle vulnerabilities, we design a powerful attacking algorithm to camouflage rumors in social networks based on reinforcement learning that can interact with and attack any black-box detectors. The environment has exponentially large state spaces, high-order graph dependencies, and delayed noisy rewards, making the state-of-the-art end-to-end approaches difficult to learn features as large learning costs and expressive limitation of graph deep models. Instead, we design domain-spe...
© Springer Nature Switzerland AG 2019. Restraining the propagation of malicious attacks in complex n...
© 2004-2012 IEEE. Identifying rumor sources in social networks plays a critical role in limiting the...
Online social networks have gained importance in recent years. Furthermore, there is a need for desi...
With the development of social media, social communication has changed. While this facilitates peopl...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Social media has been rapidly developing in the public sphere due to its ease of spreading new infor...
Socialbots are software-driven user accounts on social platforms, acting autonomously (mimicking hum...
Graph neural networks (GNNs) have enabled the automation of many web applications that entail node c...
Online social networks provide convenient conditions for the spread of rumors, and false rumors brin...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Abstract—Anonymous messaging platforms, such as Secret, Yik Yak, and Whisper, have emerged as import...
Graph Neural Networks (GNNs) have emerged as a series of effective learning methods for graph-relate...
Social networks are an interesting class of graphs likely to become of increasing importance in the ...
It is of great significance to identify influential rumor spreaders for preventing and controlling t...
The spread of rumors through online networks not only threatens the public safety but also results i...
© Springer Nature Switzerland AG 2019. Restraining the propagation of malicious attacks in complex n...
© 2004-2012 IEEE. Identifying rumor sources in social networks plays a critical role in limiting the...
Online social networks have gained importance in recent years. Furthermore, there is a need for desi...
With the development of social media, social communication has changed. While this facilitates peopl...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Social media has been rapidly developing in the public sphere due to its ease of spreading new infor...
Socialbots are software-driven user accounts on social platforms, acting autonomously (mimicking hum...
Graph neural networks (GNNs) have enabled the automation of many web applications that entail node c...
Online social networks provide convenient conditions for the spread of rumors, and false rumors brin...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Abstract—Anonymous messaging platforms, such as Secret, Yik Yak, and Whisper, have emerged as import...
Graph Neural Networks (GNNs) have emerged as a series of effective learning methods for graph-relate...
Social networks are an interesting class of graphs likely to become of increasing importance in the ...
It is of great significance to identify influential rumor spreaders for preventing and controlling t...
The spread of rumors through online networks not only threatens the public safety but also results i...
© Springer Nature Switzerland AG 2019. Restraining the propagation of malicious attacks in complex n...
© 2004-2012 IEEE. Identifying rumor sources in social networks plays a critical role in limiting the...
Online social networks have gained importance in recent years. Furthermore, there is a need for desi...