Miller et al., 2021 - Google Patents
Optimal Edge Weight Perturbations to Attack Shortest PathsMiller et al., 2021
View PDF- Document ID
- 14587968781048169176
- Author
- Miller B
- Shafi Z
- Ruml W
- Vorobeychik Y
- Eliassi-Rad T
- Alfeld S
- Publication year
- Publication venue
- arXiv preprint arXiv:2107.03347
External Links
Snippet
Finding shortest paths in a given network (eg, a computer network or a road network) is a well-studied task with many applications. We consider this task under the presence of an adversary, who can manipulate the network by perturbing its edge weights to gain an …
- 230000003094 perturbing 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
- G06F17/30958—Graphs; Linked lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6251—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on a criterion of topology preservation, e.g. multidimensional scaling, self-organising maps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Weisfeiler-lehman neural machine for link prediction | |
Song et al. | Ordered gnn: Ordering message passing to deal with heterophily and over-smoothing | |
Ahmed et al. | Learning role-based graph embeddings | |
Li et al. | Gated graph sequence neural networks | |
Cameron et al. | Predicting propositional satisfiability via end-to-end learning | |
Fafianie et al. | Streaming kernelization | |
Huang et al. | A theory of link prediction via relational weisfeiler-leman on knowledge graphs | |
Yang et al. | Soft-mask: adaptive substructure extractions for graph neural networks | |
Ling et al. | Deep generation of heterogeneous networks | |
Nassar et al. | Multimodal network alignment | |
Trung et al. | Multifactorial evolutionary algorithm for clustered minimum routing cost problem | |
Lin et al. | Multi-view graph representation learning beyond homophily | |
CN108243169A (en) | Method and system for detecting network security | |
Miller et al. | Optimal Edge Weight Perturbations to Attack Shortest Paths | |
Aziz et al. | Defender Stackelberg Game with Inverse Geodesic Length as Utility Metric. | |
Farahani et al. | A genetic and iterative local search algorithm for solving subgraph isomorphism problem | |
Miller et al. | Attacking shortest paths by cutting edges | |
Banati et al. | Modeling evolutionary group search optimization approach for community detection in social networks | |
Simiński et al. | Towards a practical approach to discover internal dependencies in rule-based knowledge bases | |
Chen et al. | Fast connectivity minimization on large-scale networks | |
KR101769247B1 (en) | Method and apparatus for comparing strings using hierarchical interval tree | |
Liu | A metastudy of algorithm lower bounds | |
Choudhary et al. | PersonaSAGE: A Multi-Persona Graph Neural Network | |
Suciu et al. | Mixing network extremal optimization for community structure detection | |
Chalupa | Partitioning networks into cliques: A randomized heuristic approach |