25,034 research outputs found
Stability of Influence Maximization
The present article serves as an erratum to our paper of the same title,
which was presented and published in the KDD 2014 conference. In that article,
we claimed falsely that the objective function defined in Section 1.4 is
non-monotone submodular. We are deeply indebted to Debmalya Mandal, Jean
Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example
to that claim.
Subsequent to becoming aware of the counter-example, we have shown that the
objective function is in fact NP-hard to approximate to within a factor of
for any .
In an attempt to fix the record, the present article combines the problem
motivation, models, and experimental results sections from the original
incorrect article with the new hardness result. We would like readers to only
cite and use this version (which will remain an unpublished note) instead of
the incorrect conference version.Comment: Erratum of Paper "Stability of Influence Maximization" which was
presented and published in the KDD1
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general
way, however, little work has been done to understand their ability to
withstand adversarial attacks. We design and evaluate two novel graph attacks
against a state-of-the-art network-level, graph-based detection system. Our
work highlights areas in adversarial machine learning that have not yet been
addressed, specifically: graph-based clustering techniques, and a global
feature space where realistic attackers without perfect knowledge must be
accounted for (by the defenders) in order to be practical. Even though less
informed attackers can evade graph clustering with low cost, we show that some
practical defenses are possible.Comment: ACM CCS 201
- …