County Meath
Sequential Manipulation Against Rank Aggregation: Theory and Algorithm
Ma, Ke, Xu, Qianqian, Zeng, Jinshan, Liu, Wei, Cao, Xiaochun, Sun, Yingfei, Huang, Qingming
Rank aggregation with pairwise comparisons is widely encountered in sociology, politics, economics, psychology, sports, etc . Given the enormous social impact and the consequent incentives, the potential adversary has a strong motivation to manipulate the ranking list. However, the ideal attack opportunity and the excessive adversarial capability cause the existing methods to be impractical. To fully explore the potential risks, we leverage an online attack on the vulnerable data collection process. Since it is independent of rank aggregation and lacks effective protection mechanisms, we disrupt the data collection process by fabricating pairwise comparisons without knowledge of the future data or the true distribution. From the game-theoretic perspective, the confrontation scenario between the online manipulator and the ranker who takes control of the original data source is formulated as a distributionally robust game that deals with the uncertainty of knowledge. Then we demonstrate that the equilibrium in the above game is potentially favorable to the adversary by analyzing the vulnerability of the sampling algorithms such as Bernoulli and reservoir methods. According to the above theoretical analysis, different sequential manipulation policies are proposed under a Bayesian decision framework and a large class of parametric pairwise comparison models. For attackers with complete knowledge, we establish the asymptotic optimality of the proposed policies. To increase the success rate of the sequential manipulation with incomplete knowledge, a distributionally robust estimator, which replaces the maximum likelihood estimation in a saddle point problem, provides a conservative data generation solution. Finally, the corroborating empirical evidence shows that the proposed method manipulates the results of rank aggregation methods in a sequential manner.
- Asia > China > Beijing > Beijing (0.04)
- Asia > China > Guangdong Province > Shenzhen (0.04)
- North America > United States (0.04)
- (7 more...)
- Personal (0.92)
- Research Report > New Finding (0.67)
- Information Technology > Security & Privacy (0.67)
- Government > Voting & Elections (0.45)
- Information Technology > Game Theory (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Uncertainty > Bayesian Inference (0.86)
- Information Technology > Artificial Intelligence > Machine Learning > Learning Graphical Models > Directed Networks > Bayesian Learning (0.86)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Optimization (0.67)
A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game
Ma, Ke, Xu, Qianqian, Zeng, Jinshan, Li, Guorong, Cao, Xiaochun, Huang, Qingming
Rank aggregation with pairwise comparisons has shown promising results in elections, sports competitions, recommendations, and information retrieval. However, little attention has been paid to the security issue of such algorithms, in contrast to numerous research work on the computational and statistical characteristics. Driven by huge profits, the potential adversary has strong motivation and incentives to manipulate the ranking list. Meanwhile, the intrinsic vulnerability of the rank aggregation methods is not well studied in the literature. To fully understand the possible risks, we focus on the purposeful adversary who desires to designate the aggregated results by modifying the pairwise data in this paper. From the perspective of the dynamical system, the attack behavior with a target ranking list is a fixed point belonging to the composition of the adversary and the victim. To perform the targeted attack, we formulate the interaction between the adversary and the victim as a game-theoretic framework consisting of two continuous operators while Nash equilibrium is established. Then two procedures against HodgeRank and RankCentrality are constructed to produce the modification of the original data. Furthermore, we prove that the victims will produce the target ranking list once the adversary masters the complete information. It is noteworthy that the proposed methods allow the adversary only to hold incomplete information or imperfect feedback and perform the purposeful attack. The effectiveness of the suggested target attack strategies is demonstrated by a series of toy simulations and several real-world data experiments. These experimental results show that the proposed methods could achieve the attacker's goal in the sense that the leading candidate of the perturbed ranking list is the designated one by the adversary.
- Asia > China > Beijing > Beijing (0.04)
- Asia > China > Guangdong Province > Shenzhen (0.04)
- North America > United States > California > Orange County > Irvine (0.04)
- (3 more...)
- Government (1.00)
- Information Technology > Security & Privacy (0.87)
- Leisure & Entertainment > Games > Computer Games (0.41)
Poisoning Attack against Estimating from Pairwise Comparisons
Ma, Ke, Xu, Qianqian, Zeng, Jinshan, Cao, Xiaochun, Huang, Qingming
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendations, and so on, attackers have strong motivation and incentives to manipulate the ranking list. They could inject malicious comparisons into the training data to fool the victim. Such a technique is called poisoning attack in regression and classification tasks. In this paper, to the best of our knowledge, we initiate the first systematic investigation of data poisoning attacks on pairwise ranking algorithms, which can be formalized as the dynamic and static games between the ranker and the attacker and can be modeled as certain kinds of integer programming problems. To break the computational hurdle of the underlying integer programming problems, we reformulate them into the distributionally robust optimization (DRO) problems, which are computationally tractable. Based on such DRO formulations, we propose two efficient poisoning attack algorithms and establish the associated theoretical guarantees. The effectiveness of the suggested poisoning attack strategies is demonstrated by a series of toy simulations and several real data experiments. These experimental results show that the proposed methods can significantly reduce the performance of the ranker in the sense that the correlation between the true ranking list and the aggregated results can be decreased dramatically.
- Asia > China > Beijing > Beijing (0.04)
- Asia > China > Guangdong Province > Shenzhen (0.04)
- North America > United States > New York (0.04)
- (5 more...)
- Leisure & Entertainment (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Voting & Elections (0.92)
Should We Be Worried About Computerized Facial Recognition?
Stephen Lawlor and David Hunt have witnessed a lot of bullying. Among the principal victims, in their experience, are young, first-time mothers, who are sometimes so intimidated that they're unable to eat. Isolating their tormentors in a separate group isn't a solution, Hunt told me: "They just knock the crap out of each other." The bullies and victims we were discussing are cows. The farm has been in his family for four generations; his calf barn, which is long and narrow and made of primeval-looking gray stone, was a horse stable in his grandfather's time.
- North America > Canada (0.06)
- North America > United States > California (0.05)
- Europe > Italy (0.05)
- Europe > Ireland > Leinster > County Meath (0.05)
'New Stonehenge' uncovered in Ireland during summer heatwave
Incredible aerial photographs of a'new Stonehenge' have been snapped over Ireland as a summer heatwave reveals the foundations of ancient buildings across the British Isles. The never-before-seen monument is made up of a ring of prehistoric ditches now buried deep underground. It was spotted in County Meath close to a 5,000-year-old Neolithic tomb called Newgrange. Historic landmarks have been cropping up across the UK over the past few weeks as a recent bout of hot weather uncovers imprints on fields and lawns that mark the sites of various old and prehistoric features. The outlines of World War II airfields and shelters have appeared in Hampshire and Cambridge, as well as long-buried Roman villages in Wales and Norfolk and a once-removed Victorian garden in Lancashire.
- Europe > Ireland > Leinster > County Meath (0.26)
- North America > United States > Georgia > Towns County (0.05)
- Europe > Netherlands > South Holland > The Hague (0.05)
- (5 more...)