Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3488560.3502213acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
extended-abstract

Robust Graph Learning for Misbehavior Detection

Published: 15 February 2022 Publication History
  • Get Citation Alerts
  • Abstract

    Recent years have witnessed the thriving of online services like social media, e-commerce, and e-finance. Those services facilitate our daily lives while breeding malicious actors like fraudsters and spammers to promote misinformation, gain monetary rewards, or reap end users' privacy. Graph-based machine learning models have been playing a critical and irreplaceable role in modeling and detecting online misbehavior. With the observation that misbehaviors are different from massive regular behaviors, the graph models can leverage the relationship between data entities from a holistic view and reveal suspicious behaviors as anomalous nodes/edges/subgraphs on the graph. In this proposal, we investigate the graph-based misbehavior detection models from an adversarial perspective, considering the adversarial nature of malicious actors and real-world factors that impair graph models' robustness. We first introduce two published works enhancing the robustness of several graph-based misbehavior detectors using reinforcement learning. Then, we propose to explore: 1) the robustness of graph neural networks for misinformation detection on social media; and 2) the general robustness of graph neural networks towards unknown perturbations.

    Supplementary Material

    MP4 File (WSDM22-wsdmdc03.mp4)
    WSDM 2022 Doctoral Consortium Presentation Video. Title: Robust Graph Learning for Misbehavior Detection. Presenter: Yingtong Dou.

    References

    [1]
    Y. Cao, H. Peng, J. Wu, Y. Dou, J. Li, and P. S. Yu. 2021. Knowledge-Preserving Incremental Social Event Detection via Heterogeneous GNNs. In WWW .
    [2]
    Y. Dou, W. Li, Z. Liu, Z. Dong, J. Luo, and P. S. Yu. 2019. Uncovering Download Fraud Activities in Mobile App Markets. In ASONAM .
    [3]
    Y. Dou, Z. Liu, L. Sun, Y. Deng, H. Peng, and P. S. Yu. 2020 a. Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters. In CIKM .
    [4]
    Y. Dou, G. Ma, P. S. Yu, and S. Xie. 2020 b. Robust Spammer Detection by Nash Reinforcement Learning. In KDD .
    [5]
    Y. Dou, K. Shu, C. Xia, P. S. Yu, and L. Sun. 2021. User Preference-aware Fake News Detection. In SIGIR .
    [6]
    W. L. Hamilton and J. Ying, R.and Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS .
    [7]
    B. Hooi, H. A. Song, A. Beutel, N. Shah, K. Shin, and C. Faloutsos. 2016. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage. In KDD .
    [8]
    M. Jiang, P. Cui, and C. Faloutsos. 2016. Suspicious behavior detection: Current trends and future directions. IEEE Intelligent Systems (2016).
    [9]
    T. N. Kipf and M. Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR .
    [10]
    Y. Liu, X. Ao, Z. Qin, J. Chi, J. Feng, H. Yang, and Q. He. 2021. Pick and Choose: A GNN-based Imbalanced Learning Approach for Fraud Detection. In WWW .
    [11]
    Z. Liu, Y. Dou, P. S. Yu, Y. Deng, and H. Peng. 2020. Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection. In SIGIR .
    [12]
    M. Luca and G. Zervas. 2016. Fake it till you make it: Reputation, competition, and Yelp review fraud. Management Science (2016).
    [13]
    Y. Ma, Z. Guo, Z. Ren, J. Tang, and D. Yin. 2020. Streaming graph neural networks. In SIGIR .
    [14]
    T. Mai, K. Hoang, A. Baigutanova, G. Alina, and S. Kim. 2021. Customs Fraud Detection in the Presence of Concept Drift. arXiv preprint arXiv:2109.14155 (2021).
    [15]
    V. Nguyen, K. Sugiyama, P. Nakov, and M. Kan. 2020. FANG: Leveraging Social Context for Fake News Detection Using Graph Representation. In CIKM .
    [16]
    H. Nilforoshan and N. Shah. 2019. SilceNDice: Mining Suspicious Multi-attribute Entity Groups with Multi-view Graphs. In DSAA .
    [17]
    H. Peng, R. Zhang, Y. Dou, R. Yang, J. Zhang, and P. S. Yu. 2021. Reinforced Neighborhood Selection Guided Multi-Relational Graph Neural Networks. TOIS (2021).
    [18]
    S. Rayana and L. Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In KDD .
    [19]
    K. Shu, S. Wang, and H. Liu. 2019. Beyond News Contents: The Role of Social Context for Fake News Detection. In WSDM .
    [20]
    L. Sun, Y. Dou, C. Yang, J. Wang, P. S. Yu, and B. Li. 2018. Adversarial Attack and Defense on Graph Data: A Survey. arXiv preprint arXiv:1812.10528 (2018).
    [21]
    R. Wen, J. Wang, C. Wu, and J. Xiong. 2020. ASA: Adversary Situation Awareness via Heterogeneous Graph Convolutional Networks. In WWW Workshops .
    [22]
    T. Zhao, C. Deng, K. Yu, T. Jiang, D. Wang, and M. Jiang. 2020. Error-Bounded Graph Anomaly Loss for GNNs. In CIKM .
    [23]
    X. Zhou and R. Zafarani. 2020. A survey of fake news: Fundamental theories, detection methods, and opportunities. CSUR (2020).
    [24]
    D. Zügner, A. Akbarnejad, and S. Günnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD .

    Cited By

    View all
    • (2023)Graph-based Village Level Poverty IdentificationProceedings of the ACM Web Conference 202310.1145/3543507.3583864(4115-4119)Online publication date: 30-Apr-2023
    • (2023)CLNode: Curriculum Learning for Node ClassificationProceedings of the Sixteenth ACM International Conference on Web Search and Data Mining10.1145/3539597.3570385(670-678)Online publication date: 27-Feb-2023

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WSDM '22: Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining
    February 2022
    1690 pages
    ISBN:9781450391320
    DOI:10.1145/3488560
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 February 2022

    Check for updates

    Author Tags

    1. adversarial learning
    2. anomaly detection
    3. graph mining

    Qualifiers

    • Extended-abstract

    Funding Sources

    • NSF

    Conference

    WSDM '22

    Acceptance Rates

    Overall Acceptance Rate 498 of 2,863 submissions, 17%

    Upcoming Conference

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)101
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Graph-based Village Level Poverty IdentificationProceedings of the ACM Web Conference 202310.1145/3543507.3583864(4115-4119)Online publication date: 30-Apr-2023
    • (2023)CLNode: Curriculum Learning for Node ClassificationProceedings of the Sixteenth ACM International Conference on Web Search and Data Mining10.1145/3539597.3570385(670-678)Online publication date: 27-Feb-2023

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media