A Qualitative Survey on Community Detection Attack Algorithms
Abstract
:1. Introduction
1.1. Scope and Contributions of the Survey
- The survey provides an overview of the community detection algorithms specially used by community detection attack algorithms.
- Another overview is related to the evaluation measures of community detection attack algorithms.
- An objective-based categorization of the community detection attack problem is introduced by Chen et al. [7], which classifies attacks into three distinct scales: target node, target community, and global attacks. While some surveys have addressed the target community attack scale, this survey is the first to examine all three scales comprehensively.
- Existing surveys often overlook various paradigms, such as genetic algorithms. In contrast, this survey encompasses various methodologies, including genetic algorithms, heuristic approaches, and objective-based strategies. This expanded coverage provides a broader view of the techniques employed in community detection attacks.
- The survey incorporates the recent algorithms for community detection attacks to present an up-to-date overview.
- The survey tries to show future directions for the researchers of the field.
1.2. Outline of the Survey
2. Preliminaries
2.1. Community Detection
2.2. Community Detection Attack
2.3. Evaluation Measures for Community Detection Attacks
- Modularity: To measure the quality of a division of a network, modularity, which was first introduced by [36], is defined as , where is the fraction of edges in the network that are internal in community and is the fraction of edges in the network which connect to nodes in community . That means it measures the difference between the number of intra-community edges and the expected number of such edges with random connections. Higher values of modularity indicate better community structure. It is particularly used for networks whose community structure is unknown. For weighted networks, the formulation of the modularity is given in [37].
- Normalized mutual information (NMI): It is a measure of similarity between two community partitions (X and Y) based on information theory. is the entropy associated with the partition X, and is the mutual information between two partitions, that is, the information that one partition has about the other. It is defined as . It can be written for the community structures ( and ) detected before and after the attack as follows:
- Adjusted Rand Index (ARI): It measures the similarity between two partitions. It is based on pair counting and defined as [39]:Its value is in the range . The larger the ARI value, the closer the two partitions are to each other.
- AML: The average quantity of link alterations to successfully attack a target node [40].
- Percentage degree increase: It is the percentage increase in the degree of the target node due to the attack [7].
- Community retention probability: It is the probability that the target nodes are found within their original communities after the attack [42].
- Miss ratio: It is defined as , where C is the target community and is the fraction of the target community nodes being associated with another community. It demonstrates the fraction of the target community in the part of the network where the nodes of the target community attempt to hide [43].
- Concealment measure (M): It assesses the effectiveness of concealing a target community C within a community structure . Two measures (namely M′ and M′′) are introduced to evaluate different dimensions. M′ assesses how well the C members are distributed across communities in , while M″ measures the degree to which C is concealed within the crowd [5].
- Community deception score (H): Fionda and Pirro [6] establish three indicators of good hiding of a target community C: (i) reachability preservation, the members of the community C should reach each other, that is, modifications should not break its connectivity; (ii) community spread, the C’s members should be spread over as many communities in the network as possible; and (iii) community hiding, the C’s members should be distributed in the largest communities. The deception score H that captures all of them is defined. Given a target community C and a community structure , the score H is defined as:The goals (i), (ii), and (iii) stated above are fulfilled by the left multiplicative factor, the first term in the right factor, and the second term in the right factor, respectively. Let us think whether the deception score H can be directly used (by maximizing it) to approach a target community hiding problem. It includes the knowledge of the community structure and would need to have the knowledge of the community detection algorithm , which produced . That means, the deception would depend on .
- Community splits (CommS): It captures the number of communities in the updated network containing the members of the target community [44].
- Community uniformity (CommU): It captures how members of the target community are distributed among the communities in the updated network using entropy [44].
- Modified NMI (MNMI): In large networks, concealing a target community might not significantly impact the communities that are not directly connected to it. Therefore, this measure evaluates NMI between the community memberships of target community nodes and their directly connected neighbors prior to and following the attack. It has the same range as NMI [44].
- Fitness: The proposed fitness function can be used to assess the attack effect [7].
- Variation of information (VI): It is a measure used for comparing two partitions (X and Y) based on information theory. It is defined as in [45]. The lower VI value implies that the partitions are more similar.
- Split–join distance (SJD): It calculates the distance between two community partitions (X and Y), proposed in [46]. It is given by . The is the projection distance of Y from X and found as follows: for each community in Y, determine the community in X with which it has the maximum overlap, then add up the maximal overlap sizes and subtract the sum from the number of elements in Y. A lower value of the split join indicates that the partitions are more similar.
- Recall: Given two community partitions (X and Y), for any distinct vertices i and j, it is defined as [47]:The numerator is the number of pairs that are in the same community in both partitions X and Y. The denominator is the total number of pairs that are in the same community in partition X. So, recall measures the proportion of relevant vertex pairs in the same community in partition X that are also found in the same community in partition Y.
- Node-centric measures: It encompasses the gain in the graph safeness and the loss in the graph persistence [49]. The equations for node safeness and persistence (which closely resemble the permanence formula) are provided in Section 3.2, allowing graph-wide computation by summing the values of all nodes in the graph.
- Constant community (CC) measures: Constant communities refer to groups of nodes that consistently belong to the same community across various community detection algorithms. The measures derived from CCs involve the number of nodes within CCs, the average density of such communities, and the average hub dominance [49].
- Attack efficiency: It measures the effectiveness of an attack. It is the number of incorrectly clustered nodes with a limited number of edge modifications (). It is defined as [50]:
- BN ( * NMI): It represents the attack cost. It measures the number of edge modifications required to decrease the NMI value. A lower BN value signifies a more effective attack [3].
3. Community Detection Attacks
3.1. Target Node Attack
3.2. Target Community Attack
3.3. Global Attack
4. Discussion and Future Directions
- Incorporating additional knowledge: Community detection algorithms used in the domain of community detection attacks are mainly restricted to network topology. Nevertheless, real-world networks frequently involve attribute data. Attribute networks combine user attributes with topological data. Future research can explore attack techniques against detection algorithms that consider attribute networks.
- Overlapping communities: Most studies have concentrated mainly on disjoint community detection algorithms in the research of community detection attacks. However, overlapping community detection allows for more flexible and realistic modeling of systems. Although few techniques [76,77] have been introduced to hide target nodes in overlapping areas, attacks at the global scale or target community scale against overlapping community detection algorithms have not yet been investigated. Even target nodes that are not in overlapping areas can be attacked. Exploring such attacks is an important research direction.
- Balancing efficiency and quality: The trade-off between efficiency and solution quality poses a significant limitation for attack algorithms. Achieving the balance between efficiency and solution quality continues to be a critical challenge in progressing this field. Future research should focus on designing new advanced algorithms that offer higher-quality solutions.
- Deception-aware detection: Since community detection algorithms can be misled by strategic manipulation, such as the removal of real links or the introduction of fake ones, deception-aware algorithms can be developed to predict missing links and identify deceptively added links. This can be accomplished by utilizing the network history (containing different snapshots of the network). For instance, analyzing modification of the community structure or detecting anomalies (like a tightly connected community becoming loosely connected after a while) can reveal significant insights.
- Large graphs: Attack algorithms may struggle with scalability issues when applied to large graphs. Among the attack algorithms proposed in the literature, only a limited number have been tested on moderate/large graphs [6,44,47,72]. Implementing global attacks on these graphs, in particular, may be more challenging. Future work in this area will likely involve designing scalable algorithms to handle the large-scale graphs.
- Different network types: An intriguing direction for future exploration lies in applying community detection attack algorithms to different network types like heterogeneous networks, dynamic networks, and multilayer networks.
- Real applications: Adapting attack algorithms to real-life problems is likely to inspire further research, as it may lead to additional problems.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Javed, M.A.; Younis, M.S.; Latif, S.; Qadir, J.; Baig, A. Community detection in networks: A multidisciplinary review. J. Netw. Comput. Appl. 2018, 108, 87–111. [Google Scholar] [CrossRef]
- Chen, J.; Chen, L.; Chen, Y.; Zhao, M.; Yu, S.; Xuan, Q.; Yang, X. GA-based Q-attack on community detection. IEEE Trans. Comput. Soc. Syst. 2019, 6, 491–503. [Google Scholar] [CrossRef]
- Liu, D.; Chang, Z.; Yang, G.; Chen, E. Hiding ourselves from community detection through genetic algorithms. Inf. Sci. 2022, 614, 123–137. [Google Scholar] [CrossRef]
- Zhao, J.; Wang, Z.; Cao, J.; Cheong, K.H. A self-adaptive evolutionary deception framework for community structure. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 4954–4967. [Google Scholar] [CrossRef]
- Waniek, M.; Michalak, T.P.; Wooldridge, M.J.; Rahwan, T. Hiding individuals and communities in a social network. Nat. Hum. Behav. 2018, 2, 139–147. [Google Scholar] [CrossRef]
- Fionda, V.; Pirro, G. Community deception or: How to stop fearing community detection algorithms. IEEE Trans. Knowl. Data Eng. 2017, 30, 660–673. [Google Scholar] [CrossRef]
- Chen, J.; Chen, Y.; Chen, L.; Zhao, M.; Xuan, Q. Multiscale evolutionary perturbation attack on community detection. IEEE Trans. Comput. Soc. Syst. 2020, 8, 62–75. [Google Scholar] [CrossRef]
- Fionda, V.; Pirrò, G. Community deception in networks: Where we are and where we should go. In Proceedings of the International Conference on Complex Networks and Their Applications, Madrid, Spain, 30 November–2 December 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 144–155. [Google Scholar]
- Kalaichelvi, N.; Easwarakumar, K. A comprehensive survey on community deception approaches in social networks. In Proceedings of the International Conference on Computer, Communication, and Signal Processing, Chennai, India, 24–25 February 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 163–173. [Google Scholar]
- Fortunato, S. Community detection in graphs. Phys. Rep. 2010, 486, 75–174. [Google Scholar] [CrossRef]
- Fortunato, S.; Hric, D. Community detection in networks: A user guide. Phys. Rep. 2016, 659, 1–44. [Google Scholar] [CrossRef]
- MacQueen, J. Some methods for classification and analysis of multivariate observations. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability; University of California Press: Berkeley, CA, USA, 1967; Volume 1, pp. 281–297. [Google Scholar]
- Hlaoui, A.; Wang, S. A direct approach to graph clustering. Neural Netw. Comput. Intell. 2004, 4, 158–163. [Google Scholar]
- Kernighan, B.W.; Lin, S. An efficient heuristic procedure for partitioning graphs. Bell Syst. Tech. J. 1970, 49, 291–307. [Google Scholar] [CrossRef]
- Girvan, M.; Newman, M.E. Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA 2002, 99, 7821–7826. [Google Scholar] [CrossRef] [PubMed]
- Newman, M.E. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2006, 74, 036104. [Google Scholar] [CrossRef] [PubMed]
- Newman, M.E. Spectral methods for community detection and graph partitioning. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2013, 88, 042822. [Google Scholar] [CrossRef] [PubMed]
- Higham, D.J.; Kalna, G.; Kibble, M. Spectral clustering and its use in bioinformatics. J. Comput. Appl. Math. 2007, 204, 25–37. [Google Scholar] [CrossRef]
- Ruan, J.; Zhang, W. An efficient spectral algorithm for network community discovery and its applications to biological and social networks. In Proceedings of the Seventh IEEE International Conference on Data Mining (ICDM 2007), Omaha, NE, USA, 28–31 October 2007; pp. 643–648. [Google Scholar]
- Brandes, U.; Delling, D.; Gaertler, M.; Gorke, R.; Hoefer, M.; Nikoloski, Z.; Wagner, D. On modularity clustering. IEEE Trans. Knowl. Data Eng. 2007, 20, 172–188. [Google Scholar] [CrossRef]
- Chen, M.; Kuzmin, K.; Szymanski, B.K. Community detection via maximization of modularity and its variants. IEEE Trans. Comput. Soc. Syst. 2014, 1, 46–65. [Google Scholar] [CrossRef]
- Newman, M.E. Fast algorithm for detecting community structure in networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2004, 69, 066133. [Google Scholar] [CrossRef] [PubMed]
- Clauset, A.; Newman, M.E.; Moore, C. Finding community structure in very large networks. Phys. Rev. E 2004, 70, 066111. [Google Scholar] [CrossRef]
- Newman, M.E. Modularity and community structure in networks. Proc. Natl. Acad. Sci. USA 2006, 103, 8577–8582. [Google Scholar] [CrossRef]
- Blondel, V.D.; Guillaume, J.L.; Lambiotte, R.; Lefebvre, E. Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008, 2008, P10008. [Google Scholar] [CrossRef]
- Traag, V.A.; Waltman, L.; Van Eck, N.J. From Louvain to Leiden: Guaranteeing well-connected communities. Sci. Rep. 2019, 9, 1–12. [Google Scholar] [CrossRef] [PubMed]
- Sobolevsky, S.; Campari, R.; Belyi, A.; Ratti, C. General optimization technique for high-quality community detection in complex networks. Phys. Rev. E 2014, 90, 012811. [Google Scholar] [CrossRef] [PubMed]
- Pons, P.; Latapy, M. Computing communities in large networks using random walks. In Proceedings of the Computer and Information Sciences-ISCIS 2005: 20th International Symposium, Istanbul, Turkey, 26–28 October 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 284–293. [Google Scholar]
- Rosvall, M.; Bergstrom, C.T. Maps of random walks on complex networks reveal community structure. Proc. Natl. Acad. Sci. USA 2008, 105, 1118–1123. [Google Scholar] [CrossRef] [PubMed]
- Reichardt, J.; Bornholdt, S. Statistical mechanics of community detection. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2006, 74, 016110. [Google Scholar] [CrossRef]
- Raghavan, U.N.; Albert, R.; Kumara, S. Near linear time algorithm to detect community structures in large-scale networks. Phys. Rev. E 2007, 76, 036106. [Google Scholar] [CrossRef] [PubMed]
- Palla, G.; Derényi, I.; Farkas, I.; Vicsek, T. Uncovering the overlapping community structure of complex networks in nature and society. Nature 2005, 435, 814–818. [Google Scholar] [CrossRef]
- Prat-Pérez, A.; Dominguez-Sal, D.; Larriba-Pey, J.L. High quality, scalable and parallel community detection for large real graphs. In Proceedings of the 23rd International Conference on World Wide Web, Seoul, Republic of Korea, 7–11 April 2014; pp. 225–236. [Google Scholar]
- Fazlali, M.; Moradi, E.; Malazi, H.T. Adaptive parallel Louvain community detection on a multicore platform. Microprocess. Microsyst. 2017, 54, 26–34. [Google Scholar] [CrossRef]
- Al-Andoli, M.N.; Tan, S.C.; Cheah, W.P.; Tan, S.Y. A review on community detection in large complex networks from conventional to deep learning methods: A call for the use of parallel meta-heuristic algorithms. IEEE Access 2021, 9, 96501–96527. [Google Scholar] [CrossRef]
- Newman, M.E.; Girvan, M. Finding and evaluating community structure in networks. Phys. Rev. E 2004, 69, 026113. [Google Scholar] [CrossRef] [PubMed]
- Newman, M.E. Analysis of weighted networks. Phys. Rev. E 2004, 70, 056131. [Google Scholar] [CrossRef]
- Danon, L.; Diaz-Guilera, A.; Duch, J.; Arenas, A. Comparing community structure identification. J. Stat. Mech. Theory Exp. 2005, 2005, P09008. [Google Scholar] [CrossRef]
- Hubert, L.; Arabie, P. Comparing partitions. J. Classif. 1985, 2, 193–218. [Google Scholar] [CrossRef]
- Chen, J.; Wu, Y.; Xu, X.; Chen, Y.; Zheng, H.; Xuan, Q. Fast gradient attack on network embedding. arXiv 2018, arXiv:1809.02797. [Google Scholar]
- Bernini, A.; Silvestri, F.; Tolomei, G. Community Membership Hiding as Counterfactual Graph Search via Deep Reinforcement Learning. arXiv 2023, arXiv:2310.08909. [Google Scholar]
- Liu, D.; Jia, R.; Liu, X.; Zhang, W. A unified framework of community hiding using symmetric nonnegative matrix factorization. Inf. Sci. 2024, 663, 120235. [Google Scholar] [CrossRef]
- Nagaraja, S. The impact of unlinkability on adversarial community detection: Effects and countermeasures. In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, Berlin, Germany, 21–23 July 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 253–272. [Google Scholar]
- Mittal, S.; Sengupta, D.; Chakraborty, T. Hide and seek: Outwitting community detection algorithms. IEEE Trans. Comput. Soc. Syst. 2021, 8, 799–808. [Google Scholar] [CrossRef]
- Meilă, M. Comparing clusterings by the variation of information. In Proceedings of the Learning Theory and Kernel Machines: 16th Annual Conference on Learning Theory and 7th Kernel Workshop, COLT/Kernel 2003, Washington, DC, USA, 24–27 August 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 173–187. [Google Scholar]
- Van Dongen, S. Performance criteria for graph clustering and Markov cluster experiments. In Report-Information Systems; Centrum Voor Wiskunde en Informatica: Amsterdam, The Netherlands, 2000; pp. 1–36. [Google Scholar]
- Liu, Y.; Liu, J.; Zhang, Z.; Zhu, L.; Li, A. REM: From structural entropy to community structure deception. Adv. Neural Inf. Process. Syst. 2019, 32, 12918–12928. [Google Scholar]
- Liu, X.; Fu, L.; Wang, X.; Hopcroft, J.E. Prohico: A probabilistic framework to hide communities in large networks. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–10. [Google Scholar]
- Kumari, S.; Yadav, R.J.; Namasudra, S.; Hsu, C.H. Intelligent deception techniques against adversarial attack on the industrial system. Int. J. Intell. Syst. 2021, 36, 2412–2437. [Google Scholar] [CrossRef]
- Liu, D.; Chang, Z.; Yang, G.; Chen, E. Community hiding using a graph autoencoder. Knowl.-Based Syst. 2022, 253, 109495. [Google Scholar] [CrossRef]
- Zachary, W.W. An information flow model for conflict and fission in small groups. J. Anthropol. Res. 1977, 33, 452–473. [Google Scholar] [CrossRef]
- Mnih, V.; Badia, A.P.; Mirza, M.; Graves, A.; Lillicrap, T.; Harley, T.; Silver, D.; Kavukcuoglu, K. Asynchronous methods for deep reinforcement learning. In Proceedings of the International Conference on Machine Learning. PMLR, New York, NY, USA, 19–24 June 2016; pp. 1928–1937. [Google Scholar]
- Fionda, V.; Pirró, G. Community deception in weighted networks. In Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Virtual Event Netherlands, 8–11 November 2021; pp. 278–282. [Google Scholar]
- Fionda, V.; Madi, S.A.; Pirrò, G. Community deception: From undirected to directed networks. Soc. Netw. Anal. Min. 2022, 12, 74. [Google Scholar] [CrossRef]
- Fionda, V.; Pirrò, G. Community deception in attributed networks. IEEE Trans. Comput. Soc. Syst. 2022, 11, 228–237. [Google Scholar] [CrossRef]
- Madi, S.A.; Pirrò, G. Community deception in directed influence networks. Soc. Netw. Anal. Min. 2023, 13, 122. [Google Scholar] [CrossRef]
- Chen, X.; Jiang, Z.; Li, H.; Ma, J.; Philip, S.Y. Community hiding by link perturbation in social networks. IEEE Trans. Comput. Soc. Syst. 2021, 8, 704–715. [Google Scholar] [CrossRef]
- Chakraborty, T.; Srinivasan, S.; Ganguly, N.; Mukherjee, A.; Bhowmick, S. Permanence and community structure in complex networks. ACM Trans. Knowl. Discov. Data (TKDD) 2016, 11, 1–34. [Google Scholar] [CrossRef]
- Nallusamy, K.; Easwarakumar, K. PERMDEC: Community deception in weighted networks using permanence. Computing 2024, 106, 353–370. [Google Scholar] [CrossRef]
- Zhang, C.; Fu, L.; Ding, J.; Cao, X.; Long, F.; Wang, X.; Zhou, L.; Zhang, J.; Zhou, C. Community Deception in Large Networks: Through the Lens of Laplacian Spectrum. IEEE Trans. Comput. Soc. Syst. 2023, 11, 2057–2069. [Google Scholar] [CrossRef]
- Madi, S.A.; Pirrò, G. Node-Centric Community Deception Based on Safeness. IEEE Trans. Comput. Soc. Syst. 2023, 11, 2955–2965. [Google Scholar] [CrossRef]
- Pirrò, G. Community Deception from a Node-Centric Perspective. IEEE Trans. Netw. Sci. Eng. 2023, 11, 969–981. [Google Scholar] [CrossRef]
- Chang, Z.; Liang, J.; Ma, S.; Liu, D. Community Hiding: Completely Escape from Community Detection. Inf. Sci. 2024, 672, 120665. [Google Scholar] [CrossRef]
- Zhao, J.; Wang, Z.; Yu, D.; Cao, J.; Cheong, K.H. Swarm intelligence for protecting sensitive identities in complex networks. Chaos Solitons Fractals 2024, 182, 114831. [Google Scholar] [CrossRef]
- Ye, F.; Chen, C.; Zheng, Z. Deep autoencoder-like nonnegative matrix factorization for community detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management, Torino, Italy, 22–26 October 2018; pp. 1393–1402. [Google Scholar]
- Yu, S.; Zheng, J.; Chen, J.; Xuan, Q.; Zhang, Q. Unsupervised euclidean distance attack on network embedding. In Proceedings of the 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), Hong Kong, China, 27–29 July 2020; pp. 71–77. [Google Scholar]
- Magelinski, T.; Bartulovic, M.; Carley, K.M. Measuring node contribution to community structure with modularity vitality. IEEE Trans. Netw. Sci. Eng. 2021, 8, 707–723. [Google Scholar] [CrossRef]
- Kipf, T.N.; Welling, M. Variational graph auto-encoders. arXiv 2016, arXiv:1611.07308. [Google Scholar]
- Yang, H.; Chen, L.; Cheng, F.; Qiu, J.; Zhang, L. LSHA: A Local Structure-Based Community Detection Attack Heuristic Approach. IEEE Trans. Comput. Soc. Syst. 2023, 11, 2966–2978. [Google Scholar] [CrossRef]
- Zhao, J.; Cheong, K.H. Obfuscating community structure in complex network with evolutionary divide-and-conquer strategy. IEEE Trans. Evol. Comput. 2023, 27, 1926–1940. [Google Scholar] [CrossRef]
- Yang, S.; Chen, B.; Zhu, G. EPCG: An Elite Population Co-evolutionary Genetic Algorithm for Global Community Deception. In Proceedings of the 7th International Conference on Control Engineering and Artificial Intelligence, Sanya, China, 28–30 January 2023; pp. 66–71. [Google Scholar]
- Wang, X.; Li, J.; Guan, Y.; Yuan, J.; Tao, H.; Zhang, S. Enhancing Community Deception based on Graph Autoencoder and Genetic Algorithm. In Proceedings of the 2023 IEEE 9th International Conference on Computer and Communications (ICCC), Chengdu, China, 8–11 December 2023; pp. 742–746. [Google Scholar]
- Grover, A.; Leskovec, J. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 855–864. [Google Scholar]
- Perozzi, B.; Al-Rfou, R.; Skiena, S. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 24–27 August 2014; pp. 701–710. [Google Scholar]
- Zhou, J.; Chen, Z.; Du, M.; Chen, L.; Yu, S.; Chen, G.; Xuan, Q. RobustECD: Enhancement of network structure for robust community detection. IEEE Trans. Knowl. Data Eng. 2021, 35, 842–856. [Google Scholar] [CrossRef]
- Yang, G.; Wang, Y.; Chang, Z.; Liu, D. Overlapping Community Hiding Method Based on Multi-Level Neighborhood Information. Symmetry 2022, 14, 2328. [Google Scholar] [CrossRef]
- Liu, D.; Yang, G.; Wang, Y.; Jin, H.; Chen, E. How to protect ourselves from overlapping community detection in social networks. IEEE Trans. Big Data 2022, 8, 894–904. [Google Scholar] [CrossRef]
Ref. | Community Detection Attack | Update | Intra/ Inter | Knowledge Needed | Measure | Comparison | Community Detection Algorithm (**) |
---|---|---|---|---|---|---|---|
[40] | FGA | EDel, EAdd | ✗ | Network | Success rate, AML | Random, Nettack, DICE | emb + km |
[7] | EPA | EAdd | ✗ | Network | Percent. degree increase | Random | gre, inf, lou, wal, eig, spi |
[41] | DRL-Agent | EDel, EAdd | ✓ | Network, CS | Success rate, NMI | Random, Degree, ROAM | opt, lou, wal |
[42] | CH-SNMF | EDel, EAdd (Rewire) | ✓ | Network, community number | Comm. retention prob. | ROAM | gre, inf, lou, lab |
Ref. | Community Detection Attack | Update | Intra/ Inter | Knowledge Needed | Measure | Comparison | Community Detection Algorithm (**) |
---|---|---|---|---|---|---|---|
[43] | Naga. | EAdd | ✓ | C’s members links, Vertex centralities | Miss ratio | No | smo |
[5] | DICE | EDel, EAdd | ✓ | C’s members links | M | No | cnm, inf, lou, wal, eig, spi, btw |
[6] | Ds, Dm | EDel, EAdd | ✓ | C’s members links for Ds, CS for Dm | H, NMI | DICE | cnm, inf, lou, wal, eig, spi, btw, lab, opt, scd |
[7] | EPA | EDel, EAdd (Rewire) | ✗ | Network, A part of CS | Fitness, H | DICE, Ds | gre, inf, lou, wal, eig, spi |
[53] | SECRETORUM | EDel, EAdd | ✓ | C’s members links | H, NMI | Random, DICE, Ds, NEURAL | cnm, inf, lou, wal, lab |
[57] | Hs | EDel, EAdd | ✓ | C’s members links | H | Ds, Dm | inf, lou, eig, spi, lab |
[44] | NEURAL | EDel, EAdd | ✓ | Node info for a subset of nodes | NMI, MNMI, CommS, CommU | Random, Naga., DICE, Ds | cnm, inf, lou, wal, eig, lab |
[48] | ProHiCo (SBM, DCSBM) | EDel, EAdd | ✓ | Network, CS | Jaccard, Recall, Precision, NMI | Ds, REM | cnm, inf, wal, lab, lei |
[60] | ComDeceptor | EDel, EAdd | ✓ | Network, CS | Jaccard, Recall, Precision, NMI | Ds, REM, DCSBM | cnm, inf, lou, eig, lei, danmf |
[41] | DRL-Agent | EDel, EAdd | ✓ | Network, CS | H, NMI | Ds, Dm | opt, lou, walk |
[61] | nSAF | EDel, EAdd, NDel, NAdd | ✗ | C’s members links | H, NMI | Random, DICE, Ds, Dm, NEURAL | cnm, inf, lou, eig, lab, scd, lei, cmb, spec, kcut |
[62] | nDec | EDel, EAdd, NDel, NAdd, NMov | ✗ | Network, CS | H, MNMI, NMI | Random, DICE, Ds, Dm, NEURAL | cnm, inf, lou, eig, lab, scd, lei, cmb, spec, kcut |
[42] | CH-SNMF | EDel, EAdd (Rewire) | ✓ | Network, Community number | H, M | DICE, Ds | gre, inf, lou, lab |
[63] | CEHA, CDHA, CCHA | EDel, EAdd | ✓ | Network, CS | NMI, Q, M | Random, DICE, Ds, NEURAL | cnm, inf, lou, lab |
[64] | SCP | EDel, EAdd | ✓ | Network, CS | NMI, VI, SJD, Local | Random, DICE, Ds, NEURAL, MOD | cnm, inf, lou, wal, eig, btw |
Ref. | Community Detection Attack | Update | Intra/ Inter | Knowledge Needed | Measure | Comparison | Community Detection Algorithm (**) |
---|---|---|---|---|---|---|---|
[2] | DBA, CDA | EDel, EAdd (Rewire) | ✓ | Network, CS | Q, NMI | Random-R | gre, inf, lou, eig, lab, n2v, km |
Q-Attack | ✗ | Network, CS, Q | |||||
[47] | REM | EAdd | ✓ | Network, CS | Jaccard, NMI, Recall | Modularity Min. (MOM), Random-Add | cnm, inf, lou, wal, spi, btw |
[7] | EPA | EDel, EAdd (Rewire) | ✗ | Network, CS | NMI, ARI | Q-Attack, EPA with H, two heuristics | gre, inf, lou, wal, eig, spi |
[66] | EDA | EDel, EAdd | ✗ | Network | NMI | Random, DICE, RLS, DBA | dpw + km |
[49] | MPL, Custom Rewiring | EDel, EAdd (Rewire) | ✓ | Network, CS | Node-centric, NMI, CCs | Ds | gre, cnm, lou, lab, cpm, bis |
[67] | Modularity Vitality | EDel, NDel | ✗ | Network, CS | Modularity Minimization | No | lei |
[50] | GCH | EDel, EAdd | ✓ | Network, CS | NMI, Attack Effic. | Random, DICE, Ds | cnm, inf, lou, wal, eig, spi, btw, lab |
[3] | CGN | EDel, EAdd | ✓ | Network, CS | Q, NMI, BN ( * NMI) | Random, DICE, Ds, Q-Attack, NEURAL | cnm, inf, lou, lab |
[4] | SAEP, DFP | EDel, EAdd | ✓ | Network, CS | NMI, VI, SJD | Random, REM, Q-Attack, DFP | cnm, inf, lou, wal, eig, btw |
[70] | CoeCo | EDel, EAdd | ✓ | Network, CS | NMI, ARI | Random, REM, Q-Attack, DFP | cnm, inf, lou, wal, eig, btw |
[71] | EPCG | EDel, EAdd | ✗ | Network, CS | NMI, ARI, Purity | Random, CDA, Q-Attack | cnm, lou, wal |
[72] | GAE + Genetic alg | EDel, EAdd | ✗ | Network | NMI, ARI | Random, Barabasi and Albert, CDA, Q-Attack | lou, lab, cpm |
[69] | LSHA | EDel, EAdd (Rewire) | ✓ | Network | NMI, ARI | Random-R, CDA, DBA, DFP-R | cnm, inf, lou, wal, lab |
[42] | CH-SNMF | EDel, EAdd (Rewire) | ✓ | Network, Community number | NMI, ARI | Random, Q-Attack | gre, inf, lou, lab |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tekin, L.; Bostanoğlu, B.E. A Qualitative Survey on Community Detection Attack Algorithms. Symmetry 2024, 16, 1272. https://doi.org/10.3390/sym16101272
Tekin L, Bostanoğlu BE. A Qualitative Survey on Community Detection Attack Algorithms. Symmetry. 2024; 16(10):1272. https://doi.org/10.3390/sym16101272
Chicago/Turabian StyleTekin, Leyla, and Belgin Ergenç Bostanoğlu. 2024. "A Qualitative Survey on Community Detection Attack Algorithms" Symmetry 16, no. 10: 1272. https://doi.org/10.3390/sym16101272