论文标题

对无规模网络的对抗性攻击:测试物理标准的鲁棒性

Adversarial Attacks to Scale-Free Networks: Testing the Robustness of Physical Criteria

论文作者

Xuan, Qi, Shan, Yalu, Wang, Jinhuan, Ruan, Zhongyuan, Chen, Guanrong

论文摘要

由于发现许多机器学习算法很容易受到恶意攻击的影响,因此对抗性攻击最近一直在警告人工智能社区。本文研究了对抗性攻击,以根据统计措施来测试其稳健性。除了众所周知的随机链接重新布线(RLR)攻击外,还制定和模拟了两次启发式攻击:基于学位 - 基于学位的链接重新布线(DALR)和基于学位的链接链路重新布线(DILR)。这三种策略用于攻击Barabási-Albert模型产生的各种尺寸的许多强大的无规模网络。发现DALR和DILR都比RLR更有效,因为重新布线较少的链接可以在同一攻击中取得成功。但是,DILR与RLR一样隐藏,因为它们都是通过在几种典型的结构特性上引入相对较少的变化来构建的,例如平均最短路径长度,平均聚类系数和平均对角线距离。本文的结果表明,从对抗性攻击效应的角度来看,必须非常小心地对网络进行分类。

Adversarial attacks have been alerting the artificial intelligence community recently, since many machine learning algorithms were found vulnerable to malicious attacks. This paper studies adversarial attacks to scale-free networks to test their robustness in terms of statistical measures. In addition to the well-known random link rewiring (RLR) attack, two heuristic attacks are formulated and simulated: degree-addition-based link rewiring (DALR) and degree-interval-based link rewiring (DILR). These three strategies are applied to attack a number of strong scale-free networks of various sizes generated from the Barabási-Albert model. It is found that both DALR and DILR are more effective than RLR, in the sense that rewiring a smaller number of links can succeed in the same attack. However, DILR is as concealed as RLR in the sense that they both are constructed by introducing a relatively small number of changes on several typical structural properties such as average shortest path-length, average clustering coefficient, and average diagonal distance. The results of this paper suggest that to classify a network to be scale-free has to be very careful from the viewpoint of adversarial attack effects.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源