{"title":"On countering adversarial perturbations in graphs using error correcting codes","authors":"Saif Eddin Jabari","doi":"arxiv-2406.14245","DOIUrl":null,"url":null,"abstract":"We consider the problem of a graph subjected to adversarial perturbations,\nsuch as those arising from cyber-attacks, where edges are covertly added or\nremoved. The adversarial perturbations occur during the transmission of the\ngraph between a sender and a receiver. To counteract potential perturbations,\nwe explore a repetition coding scheme with sender-assigned binary noise and\nmajority voting on the receiver's end to rectify the graph's structure. Our\napproach operates without prior knowledge of the attack's characteristics. We\nprovide an analytical derivation of a bound on the number of repetitions needed\nto satisfy probabilistic constraints on the quality of the reconstructed graph.\nWe show that the method can accurately decode graphs that were subjected to\nnon-random edge removal, namely, those connected to vertices with the highest\neigenvector centrality, in addition to random addition and removal of edges by\nthe attacker.","PeriodicalId":501065,"journal":{"name":"arXiv - PHYS - Data Analysis, Statistics and Probability","volume":"27 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - PHYS - Data Analysis, Statistics and Probability","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2406.14245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We consider the problem of a graph subjected to adversarial perturbations,
such as those arising from cyber-attacks, where edges are covertly added or
removed. The adversarial perturbations occur during the transmission of the
graph between a sender and a receiver. To counteract potential perturbations,
we explore a repetition coding scheme with sender-assigned binary noise and
majority voting on the receiver's end to rectify the graph's structure. Our
approach operates without prior knowledge of the attack's characteristics. We
provide an analytical derivation of a bound on the number of repetitions needed
to satisfy probabilistic constraints on the quality of the reconstructed graph.
We show that the method can accurately decode graphs that were subjected to
non-random edge removal, namely, those connected to vertices with the highest
eigenvector centrality, in addition to random addition and removal of edges by
the attacker.