Rank aggregation with pairwise comparisons has shown promising results in elections, sports competitions, recommendations, and information retrieval. However, little attention has been paid to the security issue of such algorithms, in contrast to numerous research work on the computational and statistical characteristics. Driven by huge profits, the potential adversary has strong motivation and incentives to manipulate the ranking list. Meanwhile, the intrinsic vulnerability of the rank aggregation methods is not well studied in the literature. To fully understand the possible risks, we focus on the purposeful adversary who desires to designate the aggregated results by modifying the pairwise data in this paper. From the perspective of the dynamical system, the attack behavior with a target ranking list is a fixed point belonging to the composition of the adversary and the victim. To perform the targeted attack, we formulate the interaction between the adversary and the victim as a game-theoretic framework consisting of two continuous operators while Nash equilibrium is established. Then two procedures against HodgeRank and RankCentrality are constructed to produce the modification of the original data. Furthermore, we prove that the victims will produce the target ranking list once the adversary masters the complete information. It is noteworthy that the proposed methods allow the adversary only to hold incomplete information or imperfect feedback and perform the purposeful attack. The effectiveness of the suggested target attack strategies is demonstrated by a series of toy simulations and several real-world data experiments. These experimental results show that the proposed methods could achieve the attacker's goal in the sense that the leading candidate of the perturbed ranking list is the designated one by the adversary.
翻译:以对称比较的排名总和显示了选举、体育竞赛、建议和信息检索方面的有希望的结果。然而,与关于计算和统计特点的大量研究工作相比,很少注意这种算法的安全问题。受巨额利润的驱使,潜在对手有强大的动机和动力来操纵排名列表。与此同时,文献没有很好地研究排名总和方法的内在脆弱性。为了充分理解可能的风险,我们把重点放在有意要通过修改本文中的对称数据来指定汇总结果的对手上。从动态系统的角度来看,带有目标排名列表的攻击行为是属于对手和受害者构成的固定的对称点。为了进行定向攻击,我们把对手和受害者之间的互动设计成由两个连续操作者组成的游戏理论框架。随后,对HodgeRank和Rank Centrity的两个程序进行了完善研究,以产生原始数据的修改。此外,我们证明,一旦敌机掌握了完整的信息,目标排名清单中的攻击行为是属于对手和受害者构成的构成的构成的构成。值得注意的是,为了进行定向攻击,拟议的目标排序方法只能以真实的模拟方式显示攻击的结果。通过预估测测算的结果,而显示的是,攻击的真正目标的精确的顺序是预估测算的结果。这些结果显示攻击的结果,通过预测测算结果显示,而显示的是,只有不完善的精确度是预测算的结果。