Skip to main content

Showing 1–14 of 14 results for author: Miller, B A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2510.19113  [pdf, ps, other

    cs.SI

    UniqueRank: Identifying Important and Difficult-to-Replace Nodes in Attributed Graphs

    Authors: Erica Cai, Benjamin A. Miller, Olga Simek, Christopher L. Smith

    Abstract: Node-ranking methods that focus on structural importance are widely used in a variety of applications, from ranking webpages in search engines to identifying key molecules in biomolecular networks. In real social, supply chain, and terrorist networks, one definition of importance considers the impact on information flow or network productivity when a given node is removed. In practice, however, a… ▽ More

    Submitted 21 October, 2025; originally announced October 2025.

    Comments: In submission to the IEEE, 16 pages, 14 figures

  2. arXiv:2401.04915  [pdf, other

    cs.SI

    From low resource information extraction to identifying influential nodes in knowledge graphs

    Authors: Erica Cai, Olga Simek, Benjamin A. Miller, Danielle Sullivan-Pao, Evan Young, Christopher L. Smith

    Abstract: We propose a pipeline for identifying important entities from intelligence reports that constructs a knowledge graph, where nodes correspond to entities of fine-grained types (e.g. traffickers) extracted from the text and edges correspond to extracted relations between entities (e.g. cartel membership). The important entities in intelligence reports then map to central nodes in the knowledge graph… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 14 pages, 6 figures, to appear at CompleNet 2024

  3. arXiv:2310.07980  [pdf, other

    cs.LG

    GRASP: Accelerating Shortest Path Attacks via Graph Attention

    Authors: Zohair Shafi, Benjamin A. Miller, Ayan Chatterjee, Tina Eliassi-Rad, Rajmonda S. Caceres

    Abstract: Recent advances in machine learning (ML) have shown promise in aiding and accelerating classical combinatorial optimization algorithms. ML-based speed ups that aim to learn in an end to end manner (i.e., directly output the solution) tend to trade off run time with solution quality. Therefore, solutions that are able to accelerate existing solvers while maintaining their performance guarantees, ar… ▽ More

    Submitted 23 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

  4. Graph-SCP: Accelerating Set Cover Problems with Graph Neural Networks

    Authors: Zohair Shafi, Benjamin A. Miller, Tina Eliassi-Rad, Rajmonda S. Caceres

    Abstract: Machine learning (ML) approaches are increasingly being used to accelerate combinatorial optimization (CO) problems. We investigate the Set Cover Problem (SCP) and propose Graph-SCP, a graph neural network method that augments existing optimization solvers by learning to identify a smaller sub-problem that contains the solution space. Graph-SCP uses both supervised learning from prior solved insta… ▽ More

    Submitted 9 October, 2025; v1 submitted 11 October, 2023; originally announced October 2023.

  5. arXiv:2308.05498  [pdf, other

    cs.SI

    Complex Network Effects on the Robustness of Graph Convolutional Networks

    Authors: Benjamin A. Miller, Kevin Chan, Tina Eliassi-Rad

    Abstract: Vertex classification -- the problem of identifying the class labels of nodes in a graph -- has applicability in a wide variety of domains. Examples include classifying subject areas of papers in citation networks or roles of machines in a computer network. Vertex classification using graph convolutional networks is susceptible to targeted poisoning attacks, in which both graph structure and node… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: 39 pages, 8 figures. arXiv admin note: text overlap with arXiv:2003.05822

  6. arXiv:2308.03081  [pdf, other

    cs.SI

    Using Overlapping Methods to Counter Adversaries in Community Detection

    Authors: Benjamin A. Miller, Kevin Chan, Tina Eliassi-Rad

    Abstract: When dealing with large graphs, community detection is a useful data triage tool that can identify subsets of the network that a data analyst should investigate. In an adversarial scenario, the graph may be manipulated to avoid scrutiny of certain nodes by the analyst. Robustness to such behavior is an important consideration for data analysts in high-stakes scenarios such as cyber defense and cou… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

    Comments: 28 pages, 10 figures

  7. arXiv:2305.19083  [pdf, other

    cs.SI

    Defense Against Shortest Path Attacks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is an important task in many applications. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the edge weights that users observe. The defender must balance inhibiting the attacker agains… ▽ More

    Submitted 30 April, 2025; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: 21 pages, 8 figures, to appear at the 2025 SIAM International Conference on Data Mining

  8. arXiv:2211.11141  [pdf, other

    cs.SI

    Attacking Shortest Paths by Cutting Edges

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is a common graph analysis problem that is important for many applications involving routing of resources. An adversary that can manipulate the graph structure could alter traffic patterns to gain some benefit (e.g., make more money by directing traffic to a toll road). This paper presents the Force Path Cut problem, in which an adversary remov… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

    Comments: 37 pages, 11 figures; Extended version of arXiv:2104.03761

  9. arXiv:2107.03347  [pdf, other

    cs.SI

    Optimal Edge Weight Perturbations to Attack Shortest Paths

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Finding shortest paths in a given network (e.g., a computer network or a road network) is a well-studied task with many applications. We consider this task under the presence of an adversary, who can manipulate the network by perturbing its edge weights to gain an advantage over others. Specifically, we introduce the Force Path Problem as follows. Given a network, the adversary's goal is to make a… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

  10. arXiv:2104.03761  [pdf, other

    cs.SI

    PATHATTACK: Attacking Shortest Paths in Complex Networks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Shortest paths in complex networks play key roles in many applications. Examples include routing packets in a computer network, routing traffic on a transportation network, and inferring semantic distances between concepts on the World Wide Web. An adversary with the capability to perturb the graph might make the shortest path between two nodes route traffic through advantageous portions of the gr… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  11. arXiv:2003.05822  [pdf, other

    cs.LG stat.ML

    Topological Effects on Attacks Against Vertex Classification

    Authors: Benjamin A. Miller, Mustafa Çamurcu, Alexander J. Gomez, Kevin Chan, Tina Eliassi-Rad

    Abstract: Vertex classification is vulnerable to perturbations of both graph topology and vertex attributes, as shown in recent research. As in other machine learning domains, concerns about robustness to adversarial manipulation can prevent potential users from adopting proposed methods when the consequence of action is very high. This paper considers two topological characteristics of graphs and explores… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

    Comments: 17 pages, 11 figures

  12. arXiv:1609.04859  [pdf, other

    cs.SI physics.soc-ph

    Model Selection Framework for Graph-based data

    Authors: Rajmonda S. Caceres, Leah Weiner, Matthew C. Schmidt, Benjamin A. Miller, William M. Campbell

    Abstract: Graphs are powerful abstractions for capturing complex relationships in diverse application settings. An active area of research focuses on theoretical models that define the generative mechanism of a graph. Yet given the complexity and inherent noise in real datasets, it is still very challenging to identify the best model for a given observed graph. We discuss a framework for graph model selecti… ▽ More

    Submitted 15 September, 2016; originally announced September 2016.

    Comments: 7 pages

  13. arXiv:1412.4411  [pdf, other

    cs.SI physics.soc-ph

    Spectral Anomaly Detection in Very Large Graphs: Models, Noise, and Computational Complexity

    Authors: Benjamin A. Miller, Nicholas Arcolano, Michael M. Wolf, Nadya T. Bliss

    Abstract: Anomaly detection in massive networks has numerous theoretical and computational challenges, especially as the behavior to be detected becomes small in comparison to the larger network. This presentation focuses on recent results in three key technical areas, specifically geared toward spectral methods for detection. We first discuss recent models for network behavior, and how their structure can… ▽ More

    Submitted 14 December, 2014; originally announced December 2014.

    Comments: Extended abstract of a presentation at Dagstuhl seminar 14461, "High-performance Graph Algorithms and Applications in Computational Science," held 9-14 November, 2014. 4 pages, 2 figures

  14. A Spectral Framework for Anomalous Subgraph Detection

    Authors: Benjamin A. Miller, Michelle S. Beard, Patrick J. Wolfe, Nadya T. Bliss

    Abstract: A wide variety of application domains are concerned with data consisting of entities and their relationships or connections, formally represented as graphs. Within these diverse application areas, a common problem of interest is the detection of a subset of entities whose connectivity is anomalous with respect to the rest of the data. While the detection of such anomalous subgraphs has received a… ▽ More

    Submitted 22 October, 2014; v1 submitted 29 January, 2014; originally announced January 2014.

    Comments: In submission to the IEEE, 16 pages, 8 figures

    Journal ref: IEEE Trans. Signal Process. 63 (2015) 4191-4206