一种基于图神经网络的地质钻孔数据保护方案
尚浩 , 朱恒华 , 李双 , 宋晓媚 , 夏雨 , 刘惠 , 杨帆
地球科学 ›› 2023, Vol. 48 ›› Issue (08) : 3151 -3161.
一种基于图神经网络的地质钻孔数据保护方案
A Geological Borehole Data Protection Based on Graph Neural Networks
,
随着深度学习技术的日益成熟,攻击者可以对公开的地质钻孔数据通过分类、预测等方法获取潜在的敏感信息,从而造成重要地质数据的泄露. 针对上述问题,提出了一种基于图对抗攻击的地质钻孔数据保护模型Gcntack. 一方面,基于地质数据拓扑图的度特征,产生满足同一幂律分布的攻击作为微小节点扰动,确保对抗性攻击不易被发现,同时改变了目标节点的分类结果. 另一方面,引入注意力机制,使用基于可解释性的图注意力网络模型分析影响对抗攻击结果的关键节点特性,验证Gcntack模型中选取对抗性节点的合理性. 最后,通过在基准数据集和地质钻孔数据集进行的综合实验和分析,证实了提出的地质钻孔数据保护方案能够基于较少的图结构或节点特征的对抗扰动,达到保护重要地质钻孔数据的目的.
图卷积神经网络 / 图注意力网络 / 图对抗攻击 / 可解释性 / 地质钻孔数据保护 / 深度学习
graph neural network / graph attention network / figure adversarial attack / interpretability / data protection for geological drilling data / deep learning
| [1] |
Ali-Ozkan,O., Ouda,A., 2019. Key-Based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms. 2019 International Symposium on Networks,Computers and Communications(ISNCC), 2019:1-6. https://doi.org/10.1109/ISNCC.2019.8909125. |
| [2] |
Bojchevski,A., Günnemann,S., 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. ICML, 97: 695-704. |
| [3] |
Borgs,C., Chayes,J., Cohn,H., et al., 2019. An Theory of Sparse Graph Convergence I: Limits, Sparse Random Graph Models, and Power Law Distributions. Transactions of the American Mathematical Society, 372(5): 3019-3062. https://doi.org/10.1090/tran/7543 |
| [4] |
Cai, H. Y., Zheng, V. W., Chang, K. C. C., 2018. A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications. IEEE Transactions on Knowledge and Data Engineering, 30(9): 1616-1637. https://doi.org/10.1109/tkde.2018.2807452 |
| [5] |
Chen, J. Y., Lin, X., Shi, Z. Q., et al., 2020. Link Prediction Adversarial Attack Via Iterative Gradient Attack. IEEE Transactions on Computational Social Systems, 7(4): 1081-1094. https://doi.org/10.1109/tcss. 2020. 3004059 |
| [6] |
Cuzzocrea,A., Shahriar,H., 2017. Data Masking Techniques for NoSQL Database Security: A Systematic Review. 2017 IEEE International Conference on Big Data, 2017: 4467-4473.https://doi.org/10.1109/BigData.2017.8258486 |
| [7] |
Dai,H.J., Li,H., Tian,T., et al., 2018. Adversarial Attack on Graph Structured Data. ICML, 80:1123-1132. |
| [8] |
Eikmeier,N., Gleich,D.F., 2017. Revisiting Power-Law Distributions in Spectra of Real-World Networks. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2017: 817-826. |
| [9] |
Gagula,A.C., Santillan,J.R., 2020. Integrating Geographic Information System, Remote Sensing Data, Field Surveys, and Hydraulic Simulations in Irrigation System Evaluation. Proceedings of the 2020 IEEE REGION 10 CONFERENCE (TENCON), Osaka, 2020:626-630. |
| [10] |
Hui,Y.U., Wei,Z., Xinnian,M.A., 2017. A Reversible Decryption Model for Vector and Raster Integration Based on Trigonometric Function. Bulletin of Surveying and Mapping, (10): 89-94. |
| [11] |
Jiang,D.H., Zhou,W., 2018. Decryption Model for Vector Geographic Data Based on Chebyshev Polynomials.Journal of Geomatics Science and Technology. 35(3): 321-325(in Chinese with English abstract). |
| [12] |
Kipf,T.N., Welling,M., 2017. Semi-Supervised Classification with Graph Convolutional Networks. 5th International Conference on Learning Representations, 1-14. |
| [13] |
Li, A. B., Zhu, A. X., 2019. Copyright Authentication of Digital Vector Maps Based on Spatial Autocorrelation Indices. Earth Science Informatics, 12(4): 629-639. https://doi.org/10.1007/s12145-019-00386-z |
| [14] |
Li, Y. F., Jin, R., Luo, Y., 2019. Classifying Relations in Clinical Narratives Using Segment Graph Convolutional and Recurrent Neural Networks (Seg-GCRNs). Journal of the American Medical Informatics Association, 26(3): 262-268. https://doi.org/10.1093/jamia/ocy157 |
| [15] |
Li,H., Zhu,H.H., Hua,W.H., et al.,2020.Key Technologies and Methods for Vector Geographic Data Security Protection. Earth Science, 45(12): 4574-4588 (in Chinese with English abstract). |
| [16] |
Liu,H., Zhao,B., Guo,J.B., et al., 2021. Survey on Adversarial Attacks Towards Deep Learning.Journal of Cryptologic Research, 8(2): 202-214 (in Chinese with English abstract). |
| [17] |
Ma,J.Q., Chang,B., Zhang,X., et al., 2020. CopulaGNN: Towards Integrating Representational and Correlational Roles of Graphs in Graph Neural Networks. International Conference on Learning Representations, 2020:1-13. |
| [18] |
Marti, R., Li, Z. C., Catry, T., et al., 2020. A Mapping Review on Urban Landscape Factors of Dengue Retrieved from Earth Observation Data, GIS Techniques, and Survey Questionnaires. Remote Sensing, 12(6): 932. https://doi.org/10.3390/rs12060932 |
| [19] |
Peng, Y. W., Lan, H., Yue, M. L., et al., 2018. Multipurpose Watermarking for Vector Map Protection and Authentication. Multimedia Tools and Applications, 77(6): 7239-7259. https://doi.org/10.1007/s11042-017-4631-z |
| [20] |
Pham,G.N., Ngo,S.T., Bui,A.N., et al., 2019. Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution. Applied Sciences, 9(22): 4889. https://doi.org/10.3390/app 9224889 |
| [21] |
Qiu, Y. G., Duan, H. T., Sun, J. Y., et al., 2019. Rich-Information Reversible Watermarking Scheme of Vector Maps. Multimedia Tools and Applications, 78(17): 24955-24977. https://doi.org/10.1007/s11042-019-7681-6 |
| [22] |
Qiu, Y. G., Gu, H. H., Sun, J. Y., 2017. High-Payload Reversible Watermarking Scheme of Vector Maps. Multimedia Tools and Applications, 77(5): 6385-6403. https://doi.org/10.1007/s11042-017-4546-8 |
| [23] |
Ren, N., Zhu, C. Q., Tong, D. Y., et al., 2020. Commutative Encryption and Watermarking Algorithm Based on Feature Invariants for Secure Vector Map. IEEE Access, 8: 221481-221493. https://doi.org/10.1109/access.2020.3043450 |
| [24] |
Sun,Y., Wang,S., Tang,X., et al., 2020. Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach. WWW '20: The Web Conference 2020, 2020: 673-683. |
| [25] |
Van,B.N., Lee,S.H., Kwon,K.R., 2017. Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map. Journal of Information Processing Systems,13(1):68-82. https://doi.org/10.3745/jips.03.0059 |
| [26] |
Vybornova,Y., Vladislav,S., 2019. Method for Vector Map Protection Based on Using of a Watermark Image as a Secondary Carrier. Proceedings of the ICETE (2). Prague, Czech Republic, 2019:284-293. |
| [27] |
Wang,X.D., Liu,Z., Wang,N.N., et al., 2020. Relational Metric Learning with Dual Graph Attention Networks for Social Recommendation. PAKDD (1) 2020: 104-117. |
| [28] |
Xia,D., Ge,Y.F., Tang,H.M., et al., 2020. Segmentation of Region of Interest and Identification of Rock Discontinuities in Digital Borehole Images. Earth Science, 45(11): 4207-4217 (in Chinese with English abstract). |
| [29] |
Zhai,M.G., Yang,S.F., Chen,N.H., et al., 2018. Big Data Epoch: Challenges and Opportunities for Geology. Bulletin of Chinese Academy of Sciences, 33(8):825-831 (in Chinese with English abstract). |
| [30] |
Zhu,D.Y., Zhang,Z.W., Cui,P., et al., 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2019:1399-1407. |
| [31] |
Zügner,D., Akbarnejad,A., Günnemann,S., 2018. Adversarial Attacks on Neural Networks for Graph Data. Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018: 2847-2856. |
| [32] |
江栋华,周卫, 2018.一种基于Chebyshev多项式的矢量数据几何精度脱密模型.测绘科学技术学报, 35(3):321-325. |
| [33] |
李虎,朱恒华,花卫华,等,2020.矢量地理数据安全保护关键技术和方法.地球科学, 45(12):4574-4588. |
| [34] |
刘会,赵波,郭嘉宝,等, 2021.针对深度学习的对抗攻击综述.密码学报, 8(2): 202-214. |
| [35] |
夏丁,葛云峰,唐辉明,等,2020.数字钻孔图像兴趣区域分割与岩体结构面特征识别.地球科学, 45(11): 4207-4217. |
| [36] |
翟明国,杨树锋,陈宁华,等, 2018.大数据时代:地质学的挑战与机遇.中国科学院院刊, 33(8):825-831. |
济南市科技创新发展计划(社会民生专项)项目《数字孪生城市四维可视化信息系统及在济南城区的应用》(232131001)
/
| 〈 |
|
〉 |