An Effective Node Injection Approach for Attacking Social Network Alignment
The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2025, Vol.20, p.589-604 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 604 |
---|---|
container_issue | |
container_start_page | 589 |
container_title | IEEE transactions on information forensics and security |
container_volume | 20 |
creator | Jiang, Shuyu Qiu, Yunxiang Mo, Xian Tang, Rui Wang, Wei |
description | The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network. |
doi_str_mv | 10.1109/TIFS.2024.3515842 |
format | Article |
fullrecord | <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10793446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10793446</ieee_id><sourcerecordid>10_1109_TIFS_2024_3515842</sourcerecordid><originalsourceid>FETCH-LOGICAL-c999-6da3155bb00ce1893c7dfe1ee612abca51bf939127286c5eb2e673c3058a42a00</originalsourceid><addsrcrecordid>eNpNkN1Kw0AQRhdRsFYfQPBiXyB1Z_-SvQyltcVSL9r7sNnM1rRptmyC4tvb0CJeffPBnGE4hDwDmwAw87pdzjcTzricCAUqk_yGjEApnWjG4fZvBnFPHrpuz5iUoLMRec9bOvMeXV9_IV2HCumy3Q81tDQ_nWKw7pP6EGne99Yd6nZHN8HVtqFr7L9DPNC8qXftEdv-kdx523T4dM0x2c5n2-kiWX28Laf5KnHGmERXVpy_KUvGHEJmhEsrj4CogdvSWQWlN8IAT3mmncKSo06FE0xlVnLL2JjA5ayLoesi-uIU66ONPwWwYpBRDDKKQUZxlXFmXi5MjYj_9lMjpNTsF2tpWys</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An Effective Node Injection Approach for Attacking Social Network Alignment</title><source>IEEE Electronic Library (IEL)</source><creator>Jiang, Shuyu ; Qiu, Yunxiang ; Mo, Xian ; Tang, Rui ; Wang, Wei</creator><creatorcontrib>Jiang, Shuyu ; Qiu, Yunxiang ; Mo, Xian ; Tang, Rui ; Wang, Wei</creatorcontrib><description>The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3515842</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computer security ; Costs ; Data models ; Dynamic programming ; Electronic commerce ; Faces ; Graph neural networks ; node injection attack ; Social network alignment ; Social networking (online) ; Time complexity ; user privacy</subject><ispartof>IEEE transactions on information forensics and security, 2025, Vol.20, p.589-604</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c999-6da3155bb00ce1893c7dfe1ee612abca51bf939127286c5eb2e673c3058a42a00</cites><orcidid>0000-0003-4088-5395 ; 0000-0002-3112-4861 ; 0000-0002-1249-9190</orcidid></display><links><openurl>$$Topenurl_article</openurl><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776</link.rule.ids></links><search><creatorcontrib>Jiang, Shuyu</creatorcontrib><creatorcontrib>Qiu, Yunxiang</creatorcontrib><creatorcontrib>Mo, Xian</creatorcontrib><creatorcontrib>Tang, Rui</creatorcontrib><creatorcontrib>Wang, Wei</creatorcontrib><title>An Effective Node Injection Approach for Attacking Social Network Alignment</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.</description><subject>Analytical models</subject><subject>Computer security</subject><subject>Costs</subject><subject>Data models</subject><subject>Dynamic programming</subject><subject>Electronic commerce</subject><subject>Faces</subject><subject>Graph neural networks</subject><subject>node injection attack</subject><subject>Social network alignment</subject><subject>Social networking (online)</subject><subject>Time complexity</subject><subject>user privacy</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>false</fulltext><rsrctype>article</rsrctype><creationdate>2025</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkN1Kw0AQRhdRsFYfQPBiXyB1Z_-SvQyltcVSL9r7sNnM1rRptmyC4tvb0CJeffPBnGE4hDwDmwAw87pdzjcTzricCAUqk_yGjEApnWjG4fZvBnFPHrpuz5iUoLMRec9bOvMeXV9_IV2HCumy3Q81tDQ_nWKw7pP6EGne99Yd6nZHN8HVtqFr7L9DPNC8qXftEdv-kdx523T4dM0x2c5n2-kiWX28Laf5KnHGmERXVpy_KUvGHEJmhEsrj4CogdvSWQWlN8IAT3mmncKSo06FE0xlVnLL2JjA5ayLoesi-uIU66ONPwWwYpBRDDKKQUZxlXFmXi5MjYj_9lMjpNTsF2tpWys</recordid><startdate>2025</startdate><enddate>2025</enddate><creator>Jiang, Shuyu</creator><creator>Qiu, Yunxiang</creator><creator>Mo, Xian</creator><creator>Tang, Rui</creator><creator>Wang, Wei</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4088-5395</orcidid><orcidid>https://orcid.org/0000-0002-3112-4861</orcidid><orcidid>https://orcid.org/0000-0002-1249-9190</orcidid></search><sort><creationdate>2025</creationdate><title>An Effective Node Injection Approach for Attacking Social Network Alignment</title><author>Jiang, Shuyu ; Qiu, Yunxiang ; Mo, Xian ; Tang, Rui ; Wang, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c999-6da3155bb00ce1893c7dfe1ee612abca51bf939127286c5eb2e673c3058a42a00</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2025</creationdate><topic>Analytical models</topic><topic>Computer security</topic><topic>Costs</topic><topic>Data models</topic><topic>Dynamic programming</topic><topic>Electronic commerce</topic><topic>Faces</topic><topic>Graph neural networks</topic><topic>node injection attack</topic><topic>Social network alignment</topic><topic>Social networking (online)</topic><topic>Time complexity</topic><topic>user privacy</topic><toplevel>peer_reviewed</toplevel><creatorcontrib>Jiang, Shuyu</creatorcontrib><creatorcontrib>Qiu, Yunxiang</creatorcontrib><creatorcontrib>Mo, Xian</creatorcontrib><creatorcontrib>Tang, Rui</creatorcontrib><creatorcontrib>Wang, Wei</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>no_fulltext</fulltext></delivery><addata><au>Jiang, Shuyu</au><au>Qiu, Yunxiang</au><au>Mo, Xian</au><au>Tang, Rui</au><au>Wang, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Effective Node Injection Approach for Attacking Social Network Alignment</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2025</date><risdate>2025</risdate><volume>20</volume><spage>589</spage><epage>604</epage><pages>589-604</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.</abstract><pub>IEEE</pub><doi>10.1109/TIFS.2024.3515842</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-4088-5395</orcidid><orcidid>https://orcid.org/0000-0002-3112-4861</orcidid><orcidid>https://orcid.org/0000-0002-1249-9190</orcidid></addata></record> |
fulltext | no_fulltext |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2025, Vol.20, p.589-604 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_10793446 |
source | IEEE Electronic Library (IEL) |
subjects | Analytical models Computer security Costs Data models Dynamic programming Electronic commerce Faces Graph neural networks node injection attack Social network alignment Social networking (online) Time complexity user privacy |
title | An Effective Node Injection Approach for Attacking Social Network Alignment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T15%3A28%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Effective%20Node%20Injection%20Approach%20for%20Attacking%20Social%20Network%20Alignment&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Jiang,%20Shuyu&rft.date=2025&rft.volume=20&rft.spage=589&rft.epage=604&rft.pages=589-604&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3515842&rft_dat=%3Ccrossref_ieee_%3E10_1109_TIFS_2024_3515842%3C/crossref_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10793446&rfr_iscdi=true |