A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game

September 13, 2022 ยท Entered Twilight ยท ๐Ÿ› IEEE Transactions on Pattern Analysis and Machine Intelligence

๐Ÿ’ค TWILIGHT: Eternal Rest
Repo abandoned since publication

Repo contents: Complete_Irreversible_Spectral_Target_Attack.m, Complete_Reversible_Spectral_Target_Attack.m, Construct_Transition_Matrix.m, Convex_Complete_Batch_Target_Attack.m, HodgeRank.m, Irreversible_Transition_Matrix.m, LICENSE, Naive_Attack.m, Pobabilistic_Attack.m, Proj_positive.m, README.md, Random_Attack.m, Reversible_Transition_Matrix.m, Simulation_Complete_Imperfect_Hodge_v3.m, Simulation_Complete_Imperfect_Irreversible_Spectral_v3.m, Simulation_Complete_Imperfect_Reversible_Spectral_v3.m, Simulation_Complete_Perfect_Hodge_v3.m, Simulation_Complete_Perfect_Irreversible_Spectral_v3.m, Simulation_Complete_Perfect_Reversible_Spectral_v3.m, Simulation_Incomplete_Perfect_Hodge_v3.m, Simulation_Incomplete_Perfect_Irreversible_Spectral_v3.m, Simulation_Incomplete_Perfect_Reversible_Spectral_v3.m, Spectral_Ranking.m, data_generation.m, eval_ranking.m, reciprocal_rank.m, score_to_ranking.m

Authors Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang arXiv ID 2209.05742 Category cs.LG: Machine Learning Cross-listed cs.CR, cs.GT, stat.ML Citations 23 Venue IEEE Transactions on Pattern Analysis and Machine Intelligence Repository https://github.com/alphaprime/Target_Attack_Rank_Aggregation โญ 4 Last Checked 1 month ago
Abstract
Rank aggregation with pairwise comparisons has shown promising results in elections, sports competitions, recommendations, and information retrieval. However, little attention has been paid to the security issue of such algorithms, in contrast to numerous research work on the computational and statistical characteristics. Driven by huge profits, the potential adversary has strong motivation and incentives to manipulate the ranking list. Meanwhile, the intrinsic vulnerability of the rank aggregation methods is not well studied in the literature. To fully understand the possible risks, we focus on the purposeful adversary who desires to designate the aggregated results by modifying the pairwise data in this paper. From the perspective of the dynamical system, the attack behavior with a target ranking list is a fixed point belonging to the composition of the adversary and the victim. To perform the targeted attack, we formulate the interaction between the adversary and the victim as a game-theoretic framework consisting of two continuous operators while Nash equilibrium is established. Then two procedures against HodgeRank and RankCentrality are constructed to produce the modification of the original data. Furthermore, we prove that the victims will produce the target ranking list once the adversary masters the complete information. It is noteworthy that the proposed methods allow the adversary only to hold incomplete information or imperfect feedback and perform the purposeful attack. The effectiveness of the suggested target attack strategies is demonstrated by a series of toy simulations and several real-world data experiments. These experimental results show that the proposed methods could achieve the attacker's goal in the sense that the leading candidate of the perturbed ranking list is the designated one by the adversary.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Machine Learning