首页 > 最新文献

IEEE Transactions on Big Data最新文献

英文 中文
Sentences Based Adversarial Attack on AI-Generated Text Detectors 基于句子的ai生成文本检测器对抗性攻击
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TBDATA.2025.3600034
Rongxin Tu;Xiangui Kang;Chee Wei Tan;Chi-Hung Chi;Kwok-Yan Lam
The widespread use of AI-generated text has introduced significant security concerns, driving the need for reliable detection systems. However, recent studies reveal that neural network-based detectors are vulnerable to adversarial examples. To improve the robustness of such classifiers, a number of adversarial attack strategies have been developed, particularly in the context of text sentiment classification. Most existing adversarial attack methods focus on the semantics of individual words or sentences, often neglecting the broader contextual semantics of the entire text—particularly in the case of long AI-generated text. This limitation frequently results in adversarial examples that lack fluency and coherence. In this paper, we propose a novel method called Sentence-based Adversarial attack on AI-Generated Text detectors (SAGT), which generates linguistically fluent adversarial examples by inserting model-generated sentences into the original text. To ensure contextual semantic consistency, we extract important keywords from the original text—selected based on changes in the detector's confidence score—and incorporate them into the generated sentences. Extensive experimental results demonstrate that adversarial examples crafted by SAGT can effectively evade AI-generated text detectors.
人工智能生成文本的广泛使用带来了重大的安全问题,推动了对可靠检测系统的需求。然而,最近的研究表明,基于神经网络的检测器容易受到对抗性示例的攻击。为了提高这些分类器的鲁棒性,已经开发了许多对抗性攻击策略,特别是在文本情感分类的背景下。大多数现有的对抗性攻击方法专注于单个单词或句子的语义,往往忽略了整个文本的更广泛的上下文语义,特别是在人工智能生成的长文本的情况下。这种限制经常导致对抗性的例子缺乏流畅性和连贯性。在本文中,我们提出了一种新的方法,称为基于句子的对抗性攻击ai生成文本检测器(SAGT),它通过将模型生成的句子插入到原始文本中来生成语言流畅的对抗性示例。为了确保上下文语义的一致性,我们从原始文本中提取重要的关键字——根据检测器的置信度评分的变化选择——并将它们合并到生成的句子中。大量的实验结果表明,SAGT制作的对抗性示例可以有效地逃避人工智能生成的文本检测器。
{"title":"Sentences Based Adversarial Attack on AI-Generated Text Detectors","authors":"Rongxin Tu;Xiangui Kang;Chee Wei Tan;Chi-Hung Chi;Kwok-Yan Lam","doi":"10.1109/TBDATA.2025.3600034","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3600034","url":null,"abstract":"The widespread use of AI-generated text has introduced significant security concerns, driving the need for reliable detection systems. However, recent studies reveal that neural network-based detectors are vulnerable to adversarial examples. To improve the robustness of such classifiers, a number of adversarial attack strategies have been developed, particularly in the context of text sentiment classification. Most existing adversarial attack methods focus on the semantics of individual words or sentences, often neglecting the broader contextual semantics of the entire text—particularly in the case of long AI-generated text. This limitation frequently results in adversarial examples that lack fluency and coherence. In this paper, we propose a novel method called <italic>Sentence-based Adversarial attack on AI-Generated Text detectors (SAGT)</i>, which generates linguistically fluent adversarial examples by inserting model-generated sentences into the original text. To ensure contextual semantic consistency, we extract important keywords from the original text—selected based on changes in the detector's confidence score—and incorporate them into the generated sentences. Extensive experimental results demonstrate that adversarial examples crafted by <italic>SAGT</i> can effectively evade AI-generated text detectors.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"12 1","pages":"80-91"},"PeriodicalIF":5.7,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ST-DDGAN: A Traffic Data Compensation Model Based on Image Restoration Technology ST-DDGAN:基于图像恢复技术的交通数据补偿模型
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TBDATA.2025.3600037
Rong Wang;Na Lv;Xing Huang;Qingwang Guo;Yunpeng Xiao;Chaolong Jia;Haofei Xie
In Intelligent Transportation Systems (ITS), the accuracy of compensating for missing traffic data is critical. This directly impacts the effectiveness of traffic flow prediction and road condition monitoring. Inspired by image restoration techniques, this study introduces the Generative Adversarial Network (GAN) to enhance traffic data compensation. First, to address the problem of converting traffic data into the traffic flow matrix of the road network, we propose the RoadNetIMatrix algorithm to generate the traffic flow matrix of the road network. This algorithm precisely captures traffic flow dynamics in road networks and provides a holistic representation of traffic states. Second, given the inherent spatio-temporal correlation in traffic data, we proposed a spatio-temporal collaborative mining component (STSSM). This component integrates the hidden temporal dependencies and spatial features of the mined traffic data into the GAN generator to improve the authenticity of the generated content and ensure the consistency of data compensation. Finally, addressing the influence of external characteristics of traffic data on data compensation results, an external information module based on a multi-head attention mechanism is constructed, which can effectively mine the influence of external factors of traffic data. Furthermore, spatio-temporal and external features are fused to further improve the accuracy of data compensation. Experiments show that the model has a higher accuracy of data compensation and a better generalization of the system in the case of multiple types or a high data loss rate.
在智能交通系统(ITS)中,补偿交通数据缺失的准确性至关重要。这直接影响到交通流预测和路况监测的有效性。受图像恢复技术的启发,本研究引入生成对抗网络(GAN)来增强交通数据补偿。首先,针对将交通数据转化为路网交通流矩阵的问题,我们提出了roadnetimmatrix算法来生成路网交通流矩阵。该算法精确地捕捉道路网络中的交通流动态,并提供交通状态的整体表示。其次,针对交通数据固有的时空相关性,提出了一种时空协同挖掘组件(STSSM)。该组件将挖掘的交通数据中隐藏的时间依赖关系和空间特征集成到GAN生成器中,提高生成内容的真实性,保证数据补偿的一致性。最后,针对交通数据外部特征对数据补偿结果的影响,构建了基于多头关注机制的交通数据外部信息模块,能够有效挖掘交通数据外部因素的影响。同时,将时空特征与外部特征融合,进一步提高了数据补偿的精度。实验表明,该模型在多类型或高数据丢失率的情况下具有较高的数据补偿精度和较好的系统泛化能力。
{"title":"ST-DDGAN: A Traffic Data Compensation Model Based on Image Restoration Technology","authors":"Rong Wang;Na Lv;Xing Huang;Qingwang Guo;Yunpeng Xiao;Chaolong Jia;Haofei Xie","doi":"10.1109/TBDATA.2025.3600037","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3600037","url":null,"abstract":"In Intelligent Transportation Systems (ITS), the accuracy of compensating for missing traffic data is critical. This directly impacts the effectiveness of traffic flow prediction and road condition monitoring. Inspired by image restoration techniques, this study introduces the Generative Adversarial Network (GAN) to enhance traffic data compensation. First, to address the problem of converting traffic data into the traffic flow matrix of the road network, we propose the RoadNetIMatrix algorithm to generate the traffic flow matrix of the road network. This algorithm precisely captures traffic flow dynamics in road networks and provides a holistic representation of traffic states. Second, given the inherent spatio-temporal correlation in traffic data, we proposed a spatio-temporal collaborative mining component (STSSM). This component integrates the hidden temporal dependencies and spatial features of the mined traffic data into the GAN generator to improve the authenticity of the generated content and ensure the consistency of data compensation. Finally, addressing the influence of external characteristics of traffic data on data compensation results, an external information module based on a multi-head attention mechanism is constructed, which can effectively mine the influence of external factors of traffic data. Furthermore, spatio-temporal and external features are fused to further improve the accuracy of data compensation. Experiments show that the model has a higher accuracy of data compensation and a better generalization of the system in the case of multiple types or a high data loss rate.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"12 1","pages":"62-79"},"PeriodicalIF":5.7,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Modal Entity in One Word: Aligning Multi-Level Semantics for Multi-Modal Knowledge Graph Completion 一个词中的多模态实体:多模态知识图补全的多层语义对齐
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TBDATA.2025.3600014
Lan Zhao;Boyue Wang;Junbin Gao;Xiaoyan Li;Yongli Hu;Baocai Yin
Current multi-modal knowledge graph completion often incorporates simple fusion neural networks to achieve multi-modal alignment and knowledge completion tasks, which face three major challenges: 1) Inconsistent semantics between images and texts corresponding to the same entity; 2) Discrepancies in semantic spaces resulting from the use of diverse uni-modal feature extractors; 3) Inadequate evaluation of semantic alignment using only energy functions or basic contrastive learning losses. To address these challenges, we propose the Multi-modal Entity in One Word (MEOW) model. This model ensures alignment at various levels, including text-image match alignment, feature alignment and distribution alignment. Specificially, the entity image filtering module utilizes a visual-language model to exclude unrelated images by aligning their captions with corresponding text descriptions. A pre-trained CLIP-based encoder is utilized for encoding dense semantic relationships, while a graph attention network based structure encoder handles sparse semantic relationships, yielding a comprehensive semantic representation and enhancing convergence speed. Additionally, a diffusion model is integrated to enhance denoising capabilities. The proposed MEOW further includes a distribution alignment module equipped with dense alignment constraint, integrity alignment constraint, and fusion fidelity constraint to effectively align multi-modal representations. Experiments on two public multi-modal knowledge graph datasets show that MEOW significantly improves link prediction performance.
当前的多模态知识图谱补全通常采用简单的融合神经网络来完成多模态对齐和知识补全任务,这面临着三个主要挑战:1)同一实体对应的图像和文本之间语义不一致;2)使用不同的单模态特征提取器导致的语义空间差异;3)仅使用能量函数或基本对比学习损失对语义对齐的评价不足。为了应对这些挑战,我们提出了一个词中的多模态实体(MEOW)模型。该模型保证了不同层次的对齐,包括文本-图像匹配对齐、特征对齐和分布对齐。具体来说,实体图像过滤模块利用一种视觉语言模型,通过将图像的标题与相应的文本描述对齐来排除不相关的图像。利用预训练的基于clip的编码器对密集语义关系进行编码,利用基于图注意网络的结构编码器对稀疏语义关系进行编码,得到了全面的语义表示,提高了收敛速度。此外,还集成了扩散模型来增强去噪能力。提出的MEOW进一步包括一个分布对齐模块,该模块配备密集对齐约束、完整性对齐约束和融合保真度约束,以有效地对齐多模态表示。在两个公共多模态知识图数据集上的实验表明,MEOW显著提高了链路预测性能。
{"title":"Multi-Modal Entity in One Word: Aligning Multi-Level Semantics for Multi-Modal Knowledge Graph Completion","authors":"Lan Zhao;Boyue Wang;Junbin Gao;Xiaoyan Li;Yongli Hu;Baocai Yin","doi":"10.1109/TBDATA.2025.3600014","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3600014","url":null,"abstract":"Current multi-modal knowledge graph completion often incorporates simple fusion neural networks to achieve multi-modal alignment and knowledge completion tasks, which face three major challenges: 1) Inconsistent semantics between images and texts corresponding to the same entity; 2) Discrepancies in semantic spaces resulting from the use of diverse uni-modal feature extractors; 3) Inadequate evaluation of semantic alignment using only energy functions or basic contrastive learning losses. To address these challenges, we propose the Multi-modal Entity in One Word (MEOW) model. This model ensures alignment at various levels, including text-image match alignment, feature alignment and distribution alignment. Specificially, the entity image filtering module utilizes a visual-language model to exclude unrelated images by aligning their captions with corresponding text descriptions. A pre-trained CLIP-based encoder is utilized for encoding dense semantic relationships, while a graph attention network based structure encoder handles sparse semantic relationships, yielding a comprehensive semantic representation and enhancing convergence speed. Additionally, a diffusion model is integrated to enhance denoising capabilities. The proposed MEOW further includes a distribution alignment module equipped with dense alignment constraint, integrity alignment constraint, and fusion fidelity constraint to effectively align multi-modal representations. Experiments on two public multi-modal knowledge graph datasets show that MEOW significantly improves link prediction performance.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"11 6","pages":"3539-3552"},"PeriodicalIF":5.7,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VDDFormer: A Variable Dependency Discrepancy-Based Transformer for Multivariate Time Series Anomaly Detection VDDFormer:一种基于变量依赖差异的多变量时间序列异常检测变压器
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TBDATA.2025.3600004
Bo Liu;Lingling Tao;Xiaodan Chen;Zhijun Li
The dynamics of multivariate time series (MTS) data are jointly characterized by its nonlinear temporal dependencies and complex variable dependencies, making unsupervised time series anomaly detection a challenging task. Existing methods primarily rely on prediction or reconstruction errors, neglecting the valuable information within the variable dependencies. In this paper, we propose a variable dependency discrepancy-based Transformer (VDDFormer) for unsupervised MTS anomaly detection. VDDFormer comprises a variable correlation encoder, a temporal dependency encoder, and a reconstruction decoder. The variable correlation encoder capitalizes on a variable dependency attention mechanism, which employs self-attention to learn the global variable dependencies; meanwhile, the local variable dependencies are captured by the adaptive correlation matrix. The global and local variable dependencies are then used to compute the variable dependency discrepancy as a new intrinsic property to distinguish between normal and abnormal patterns. By integrating this new discrepancy with the reconstruction error, the model effectively enhances its anomaly differentiation capability. Extensive experiments on five real-world anomaly detection datasets demonstrate that VDDFormer effectively and robustly detects group anomaly patterns by leveraging the variable dependency discrepancy and achieves state-of-the-art performance on four out of the five datasets.
多变量时间序列(MTS)数据具有非线性时间依赖性和复杂变量依赖性的共同特征,使得无监督时间序列异常检测成为一项具有挑战性的任务。现有方法主要依赖于预测或重构误差,忽略了变量依赖关系中有价值的信息。在本文中,我们提出了一种基于变量依赖差异的变压器(VDDFormer)用于无监督MTS异常检测。VDDFormer包括可变相关编码器、时间依赖性编码器和重构解码器。变量相关编码器利用变量依赖关注机制,利用自关注来学习全局变量依赖;同时,利用自适应相关矩阵捕获局部变量的依赖关系。然后使用全局和局部变量依赖来计算变量依赖差异,作为区分正常和异常模式的新固有属性。将这种新的差异与重建误差相结合,有效地提高了模型的异常判别能力。在五个实际异常检测数据集上的大量实验表明,VDDFormer通过利用变量依赖差异有效且稳健地检测组异常模式,并在五个数据集中的四个上达到了最先进的性能。
{"title":"VDDFormer: A Variable Dependency Discrepancy-Based Transformer for Multivariate Time Series Anomaly Detection","authors":"Bo Liu;Lingling Tao;Xiaodan Chen;Zhijun Li","doi":"10.1109/TBDATA.2025.3600004","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3600004","url":null,"abstract":"The dynamics of multivariate time series (MTS) data are jointly characterized by its nonlinear temporal dependencies and complex variable dependencies, making unsupervised time series anomaly detection a challenging task. Existing methods primarily rely on prediction or reconstruction errors, neglecting the valuable information within the variable dependencies. In this paper, we propose a variable dependency discrepancy-based Transformer (VDDFormer) for unsupervised MTS anomaly detection. VDDFormer comprises a variable correlation encoder, a temporal dependency encoder, and a reconstruction decoder. The variable correlation encoder capitalizes on a variable dependency attention mechanism, which employs self-attention to learn the global variable dependencies; meanwhile, the local variable dependencies are captured by the adaptive correlation matrix. The global and local variable dependencies are then used to compute the variable dependency discrepancy as a new intrinsic property to distinguish between normal and abnormal patterns. By integrating this new discrepancy with the reconstruction error, the model effectively enhances its anomaly differentiation capability. Extensive experiments on five real-world anomaly detection datasets demonstrate that VDDFormer effectively and robustly detects group anomaly patterns by leveraging the variable dependency discrepancy and achieves state-of-the-art performance on four out of the five datasets.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"12 1","pages":"34-46"},"PeriodicalIF":5.7,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intent-Driven Semantic Query: An Effective Approach for Temporal Knowledge Graph Query 意图驱动语义查询:一种有效的时态知识图查询方法
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TBDATA.2025.3600035
Luyi Bai;Jixuan Dong;Lin Zhu
The temporal knowledge graph (TKG) query facilitates the retrieval of potential answers by parsing questions that incorporate temporal constraints, regarded as a vital downstream task in the broader spectrum of the TKG applications. Currently, enhancing the accuracy of the queries and the user experience has become a focal point for researchers. Existing query methods of the TKG aim to execute unambiguous standard query statements to return query results while neglecting the potential ambiguity in user input queries. To overcome this problem, in this paper, we propose a semantic query model for temporal knowledge graphs, TKGSQ-PM (Temporal Knowledge Graph Semantic Query based on Pre-trained Model). This model first identifies and extracts entity and temporal information from temporal knowledge graph queries and obtains corresponding temporal knowledge graph embedding information based on embedding methods. Then, it utilizes the pre-trained model DistilBERT to infer the true query intent from user input queries. Finally, it performs comprehensive sorting to return high-quality query results. We conduct multiple experiments on three different datasets to demonstrate the efficiency and effectiveness of the proposed methods. Experimental results indicate that the TKGSQ-PM model has an overall advantage over baseline models in terms of query effectiveness and efficiency.
时间知识图(TKG)查询通过解析包含时间约束的问题来促进潜在答案的检索,这在更广泛的TKG应用程序中被视为重要的下游任务。目前,提高查询的准确性和用户体验已成为研究人员关注的焦点。TKG现有查询方法的目标是执行无二义性的标准查询语句返回查询结果,而忽略了用户输入查询中潜在的二义性。为了克服这一问题,本文提出了一种时态知识图的语义查询模型TKGSQ-PM(基于预训练模型的时态知识图语义查询)。该模型首先从时态知识图查询中识别和提取实体信息和时态信息,并基于嵌入方法获得相应的时态知识图嵌入信息。然后,利用预训练的模型蒸馏器从用户输入查询中推断出真实的查询意图。最后,它执行全面排序以返回高质量的查询结果。我们在三个不同的数据集上进行了多次实验,以证明所提出方法的效率和有效性。实验结果表明,TKGSQ-PM模型在查询效果和查询效率方面均优于基线模型。
{"title":"Intent-Driven Semantic Query: An Effective Approach for Temporal Knowledge Graph Query","authors":"Luyi Bai;Jixuan Dong;Lin Zhu","doi":"10.1109/TBDATA.2025.3600035","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3600035","url":null,"abstract":"The temporal knowledge graph (TKG) query facilitates the retrieval of potential answers by parsing questions that incorporate temporal constraints, regarded as a vital downstream task in the broader spectrum of the TKG applications. Currently, enhancing the accuracy of the queries and the user experience has become a focal point for researchers. Existing query methods of the TKG aim to execute unambiguous standard query statements to return query results while neglecting the potential ambiguity in user input queries. To overcome this problem, in this paper, we propose a semantic query model for temporal knowledge graphs, TKGSQ-PM (Temporal Knowledge Graph Semantic Query based on Pre-trained Model). This model first identifies and extracts entity and temporal information from temporal knowledge graph queries and obtains corresponding temporal knowledge graph embedding information based on embedding methods. Then, it utilizes the pre-trained model DistilBERT to infer the true query intent from user input queries. Finally, it performs comprehensive sorting to return high-quality query results. We conduct multiple experiments on three different datasets to demonstrate the efficiency and effectiveness of the proposed methods. Experimental results indicate that the TKGSQ-PM model has an overall advantage over baseline models in terms of query effectiveness and efficiency.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"12 1","pages":"92-104"},"PeriodicalIF":5.7,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial High-Performance Recommender Systems Based on Spatiotemporal Data 基于时空数据的编辑高性能推荐系统
IF 7.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-10 DOI: 10.1109/TBDATA.2024.3451088
Shuo Shang;Qi Liu;Renhe Jiang;Ryosuke Shibasaki;Panos Kalnis;Christian S. Jensen
{"title":"Editorial High-Performance Recommender Systems Based on Spatiotemporal Data","authors":"Shuo Shang;Qi Liu;Renhe Jiang;Ryosuke Shibasaki;Panos Kalnis;Christian S. Jensen","doi":"10.1109/TBDATA.2024.3451088","DOIUrl":"https://doi.org/10.1109/TBDATA.2024.3451088","url":null,"abstract":"","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"11 4","pages":"1588-1588"},"PeriodicalIF":7.5,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11077801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144597786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Big Data Analytics in Complex Social Information Networks 社论:复杂社会信息网络中的大数据分析
IF 7.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-10 DOI: 10.1109/TBDATA.2024.3485316
Desheng Dash Wu;David L. Olson
This special issue deals with research related to applications of and methods to support Big Data analytics in complex social information networks. The digital age and the rise of social media have sped up changes to social systems with unforeseen consequences. However, there are major challenges created.
本期特刊讨论了在复杂的社会信息网络中支持大数据分析的应用和方法。数字时代和社交媒体的兴起加速了社会体系的变革,带来了不可预见的后果。然而,也产生了重大挑战。
{"title":"Editorial: Big Data Analytics in Complex Social Information Networks","authors":"Desheng Dash Wu;David L. Olson","doi":"10.1109/TBDATA.2024.3485316","DOIUrl":"https://doi.org/10.1109/TBDATA.2024.3485316","url":null,"abstract":"This special issue deals with research related to applications of and methods to support Big Data analytics in complex social information networks. The digital age and the rise of social media have sped up changes to social systems with unforeseen consequences. However, there are major challenges created.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"11 4","pages":"1650-1651"},"PeriodicalIF":7.5,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11077792","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144598007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GE-GNN: Gated Edge-Augmented Graph Neural Network for Fraud Detection 用于欺诈检测的门控边缘增强图神经网络
IF 7.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-18 DOI: 10.1109/TBDATA.2025.3562486
Wenxin Zhang;Cuicui Luo
Graph Neural Networks (GNNs) play a significant role and have been widely applied in fraud detection tasks, exhibiting substantial improvements in detection performance compared to conventional methodologies. However, within the intricate structure of fraud graphs, fraudsters usually camouflage themselves among a large number of benign entities. An effective solution to address the camouflage problem involves the incorporation of complex and abundant edge information. Nevertheless, existing GNN-based methods frequently neglect to integrate this crucial information into the message passing process, thereby limiting their efficacy. To address the above issues, this study proposes a novel Gated Edge-augmented Graph Neural Network(GE-GNN). Our approach begins with an edge-based feature augmentation mechanism that leverages both node and edge features within a single relation. Subsequently, we apply the augmented representation to the message passing process to update the node embeddings. Furthermore, we design a gate logistic to regulate the expression of augmented information. Finally, we integrate node features across different relations to obtain a comprehensive representation. Extensive experimental results on two real-world datasets demonstrate that the proposed method outperforms several state-of-the-art methods.
图神经网络(gnn)在欺诈检测任务中发挥着重要作用,并已被广泛应用,与传统方法相比,在检测性能方面有了实质性的改进。然而,在错综复杂的欺诈图结构中,欺诈者往往隐藏在大量良性实体之中。利用复杂而丰富的边缘信息是解决伪装问题的有效方法。然而,现有的基于gnn的方法经常忽略将这一关键信息集成到消息传递过程中,从而限制了它们的有效性。为了解决上述问题,本研究提出了一种新的门控边缘增强图神经网络(GE-GNN)。我们的方法从基于边缘的特征增强机制开始,该机制在单个关系中利用节点和边缘特征。随后,我们将增强表示应用到消息传递过程中,以更新节点嵌入。此外,我们还设计了一个门逻辑来调节增广信息的表达。最后,对不同关系的节点特征进行整合,得到一个综合的表示。在两个真实数据集上的广泛实验结果表明,所提出的方法优于几种最先进的方法。
{"title":"GE-GNN: Gated Edge-Augmented Graph Neural Network for Fraud Detection","authors":"Wenxin Zhang;Cuicui Luo","doi":"10.1109/TBDATA.2025.3562486","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3562486","url":null,"abstract":"Graph Neural Networks (GNNs) play a significant role and have been widely applied in fraud detection tasks, exhibiting substantial improvements in detection performance compared to conventional methodologies. However, within the intricate structure of fraud graphs, fraudsters usually camouflage themselves among a large number of benign entities. An effective solution to address the camouflage problem involves the incorporation of complex and abundant edge information. Nevertheless, existing GNN-based methods frequently neglect to integrate this crucial information into the message passing process, thereby limiting their efficacy. To address the above issues, this study proposes a novel Gated Edge-augmented Graph Neural Network(GE-GNN). Our approach begins with an edge-based feature augmentation mechanism that leverages both node and edge features within a single relation. Subsequently, we apply the augmented representation to the message passing process to update the node embeddings. Furthermore, we design a gate logistic to regulate the expression of augmented information. Finally, we integrate node features across different relations to obtain a comprehensive representation. Extensive experimental results on two real-world datasets demonstrate that the proposed method outperforms several state-of-the-art methods.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"11 4","pages":"1664-1676"},"PeriodicalIF":7.5,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144598065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology-Based Node-Level Membership Inference Attacks on Graph Neural Networks 基于拓扑的图神经网络节点级隶属推理攻击
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-08 DOI: 10.1109/TBDATA.2025.3558855
Faqian Guan;Tianqing Zhu;Wanlei Zhou;Philip S. Yu
Graph neural networks (GNNs) have obtained considerable attention due to their ability to leverage the inherent topological and node information present in graph data. While extensive research has been conducted on privacy attacks targeting machine learning models, the exploration of privacy risks associated with node-level membership inference attacks on GNNs remains relatively limited. GNNs learn representations that encapsulate valuable information about the nodes. These learned representations can be exploited by attackers to infer whether a specific node belongs to the training dataset, leading to the disclosure of sensitive information. The insidious nature of such privacy breaches often leads to an underestimation of the associated risks. Furthermore, the inherent challenges posed by node membership inference attacks make it difficult to develop effective attack models for GNNs that can successfully infer node membership. We propose a more efficient approach that specifically targets node-level membership inference attacks on GNNs. Initially, we combine nodes and their respective neighbors to carry out node membership inference attacks. To address the challenge of variable-length features arising from the differing number of neighboring nodes, we introduce an effective feature processing strategy. Furthermore, we propose two strategies: multiple training of shadow models and random selection of non-membership data, to enhance the performance of the attack model. We empirically evaluate the efficacy of our proposed method using three benchmark datasets. Additionally, we explore two potential defense mechanisms against node-level membership inference attacks.
图神经网络(gnn)由于能够利用图数据中存在的固有拓扑和节点信息而获得了相当大的关注。虽然针对机器学习模型的隐私攻击进行了广泛的研究,但对gnn上节点级成员推理攻击相关的隐私风险的探索仍然相对有限。gnn学习封装有关节点的有价值信息的表示。这些学习到的表示可以被攻击者利用来推断特定节点是否属于训练数据集,从而导致敏感信息的泄露。此类隐私泄露的隐蔽性往往导致对相关风险的低估。此外,节点隶属度推理攻击所带来的固有挑战使得很难开发出能够成功推断节点隶属度的gnn有效攻击模型。我们提出了一种更有效的方法,专门针对gnn的节点级成员推理攻击。最初,我们将节点和它们各自的邻居结合起来进行节点隶属推理攻击。为了解决因相邻节点数量不同而产生的变长特征的挑战,我们引入了一种有效的特征处理策略。为了提高攻击模型的性能,我们提出了多重训练阴影模型和随机选择非隶属性数据两种策略。我们使用三个基准数据集对我们提出的方法的有效性进行了实证评估。此外,我们还探讨了针对节点级成员推理攻击的两种潜在防御机制。
{"title":"Topology-Based Node-Level Membership Inference Attacks on Graph Neural Networks","authors":"Faqian Guan;Tianqing Zhu;Wanlei Zhou;Philip S. Yu","doi":"10.1109/TBDATA.2025.3558855","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3558855","url":null,"abstract":"Graph neural networks (GNNs) have obtained considerable attention due to their ability to leverage the inherent topological and node information present in graph data. While extensive research has been conducted on privacy attacks targeting machine learning models, the exploration of privacy risks associated with node-level membership inference attacks on GNNs remains relatively limited. GNNs learn representations that encapsulate valuable information about the nodes. These learned representations can be exploited by attackers to infer whether a specific node belongs to the training dataset, leading to the disclosure of sensitive information. The insidious nature of such privacy breaches often leads to an underestimation of the associated risks. Furthermore, the inherent challenges posed by node membership inference attacks make it difficult to develop effective attack models for GNNs that can successfully infer node membership. We propose a more efficient approach that specifically targets node-level membership inference attacks on GNNs. Initially, we combine nodes and their respective neighbors to carry out node membership inference attacks. To address the challenge of variable-length features arising from the differing number of neighboring nodes, we introduce an effective feature processing strategy. Furthermore, we propose two strategies: multiple training of shadow models and random selection of non-membership data, to enhance the performance of the attack model. We empirically evaluate the efficacy of our proposed method using three benchmark datasets. Additionally, we explore two potential defense mechanisms against node-level membership inference attacks.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"11 5","pages":"2809-2826"},"PeriodicalIF":5.7,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144934350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revocable DSSE in Healthcare Systems With Range Query Support 具有范围查询支持的医疗保健系统中可撤销的DSSE
IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-01 DOI: 10.1109/TBDATA.2025.3556636
Hanqi Zhang;Yandong Zheng;Chang Xu;Liehuang Zhu;Jiayin Wang
With the rapid development of cloud computing, online health monitoring systems are becoming increasingly prevalent. To protect medical data privacy while supporting search operations, Dynamic Searchable Symmetric Encryption (DSSE) technology has been widely used in health monitoring systems. For better monitoring of patient status, keyword range query is also a necessary requirement for the DSSE scheme. Furthermore, in the multi-user setting, user revocation usually leads the owner to download and re-encrypt all indexes, resulting in significant computational overhead. In this paper, we propose a lightweight revocable DSSE scheme with range query support. First, we propose a novel and privacy-preserving range query algorithm that defends plaintext inference attacks. Second, we design a singly linked list structure based on delegatable pseudorandom functions and key-updatable pseudorandom functions, which support lightweight user revocation. Rigorous security analysis proves the security of our proposed range query scheme and demonstrates that our scheme can achieve forward and backward privacy. Experimental evaluations show that our scheme is highly efficient.
随着云计算的快速发展,在线健康监测系统越来越普遍。为了在支持搜索操作的同时保护医疗数据隐私,动态可搜索对称加密(DSSE)技术已广泛应用于健康监测系统中。为了更好地监测患者状态,关键字范围查询也是DSSE方案的必要要求。此外,在多用户设置中,用户撤销通常会导致所有者下载并重新加密所有索引,从而导致大量的计算开销。本文提出了一种支持范围查询的轻量级可撤销DSSE方案。首先,我们提出了一种新的保护隐私的范围查询算法来防御明文推理攻击。其次,基于可委派伪随机函数和可键更新伪随机函数设计了支持轻量级用户撤销的单链表结构。严格的安全性分析证明了我们提出的范围查询方案的安全性,并证明了我们的方案可以实现前向和后向隐私。实验结果表明,该方案是高效的。
{"title":"Revocable DSSE in Healthcare Systems With Range Query Support","authors":"Hanqi Zhang;Yandong Zheng;Chang Xu;Liehuang Zhu;Jiayin Wang","doi":"10.1109/TBDATA.2025.3556636","DOIUrl":"https://doi.org/10.1109/TBDATA.2025.3556636","url":null,"abstract":"With the rapid development of cloud computing, online health monitoring systems are becoming increasingly prevalent. To protect medical data privacy while supporting search operations, Dynamic Searchable Symmetric Encryption (DSSE) technology has been widely used in health monitoring systems. For better monitoring of patient status, keyword range query is also a necessary requirement for the DSSE scheme. Furthermore, in the multi-user setting, user revocation usually leads the owner to download and re-encrypt all indexes, resulting in significant computational overhead. In this paper, we propose a lightweight revocable DSSE scheme with range query support. First, we propose a novel and privacy-preserving range query algorithm that defends plaintext inference attacks. Second, we design a singly linked list structure based on delegatable pseudorandom functions and key-updatable pseudorandom functions, which support lightweight user revocation. Rigorous security analysis proves the security of our proposed range query scheme and demonstrates that our scheme can achieve forward and backward privacy. Experimental evaluations show that our scheme is highly efficient.","PeriodicalId":13106,"journal":{"name":"IEEE Transactions on Big Data","volume":"11 5","pages":"2764-2778"},"PeriodicalIF":5.7,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144934474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Big Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1