March 6, 2024, 5:11 a.m. | Ying Xu, Michael Lanier, Anindya Sarkar, Yevgeniy Vorobeychik

cs.CR updates on arXiv.org arxiv.org

arXiv:2402.12426v2 Announce Type: replace-cross
Abstract: Graphs are commonly used to model complex networks prevalent in modern social media and literacy applications. Our research investigates the vulnerability of these graphs through the application of feature based adversarial attacks, focusing on both decision time attacks and poisoning attacks. In contrast to state of the art models like Net Attack and Meta Attack, which target node attributes and graph structure, our study specifically targets node attributes. For our analysis, we utilized the text …

adversarial adversarial attacks application applications arxiv attacks attributes cs.cr cs.lg cs.si decision feature graph graphs media networks neural networks node poisoning poisoning attacks prevalent research social social media state vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden