Skip to main content

Showing 1–9 of 9 results for author: Shafi, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07642  [pdf, other

    cs.LG cs.SI

    Generating Human Understandable Explanations for Node Embeddings

    Authors: Zohair Shafi, Ayan Chatterjee, Tina Eliassi-Rad

    Abstract: Node embedding algorithms produce low-dimensional latent representations of nodes in a graph. These embeddings are often used for downstream tasks, such as node classification and link prediction. In this paper, we investigate the following two questions: (Q1) Can we explain each embedding dimension with human-understandable graph features (e.g. degree, clustering coefficient and PageRank). (Q2) H… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2310.07980  [pdf, other

    cs.LG

    GRASP: Accelerating Shortest Path Attacks via Graph Attention

    Authors: Zohair Shafi, Benjamin A. Miller, Ayan Chatterjee, Tina Eliassi-Rad, Rajmonda S. Caceres

    Abstract: Recent advances in machine learning (ML) have shown promise in aiding and accelerating classical combinatorial optimization algorithms. ML-based speed ups that aim to learn in an end to end manner (i.e., directly output the solution) tend to trade off run time with solution quality. Therefore, solutions that are able to accelerate existing solvers while maintaining their performance guarantees, ar… ▽ More

    Submitted 23 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

  3. arXiv:2310.07979  [pdf, other

    cs.LG cs.DM

    Graph-SCP: Accelerating Set Cover Problems with Graph Neural Networks

    Authors: Zohair Shafi, Benjamin A. Miller, Tina Eliassi-Rad, Rajmonda S. Caceres

    Abstract: Machine learning (ML) approaches are increasingly being used to accelerate combinatorial optimization (CO) problems. We look specifically at the Set Cover Problem (SCP) and propose Graph-SCP, a graph neural network method that can augment existing optimization solvers by learning to identify a much smaller sub-problem that contains the solution space. We evaluate the performance of Graph-SCP on sy… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

  4. arXiv:2305.19083  [pdf, other

    cs.SI

    Defense Against Shortest Path Attacks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is an important task in applications involving routing of resources. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the weights of the graph that users observe. The defender must bala… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  5. arXiv:2211.11141  [pdf, other

    cs.SI

    Attacking Shortest Paths by Cutting Edges

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Identifying shortest paths between nodes in a network is a common graph analysis problem that is important for many applications involving routing of resources. An adversary that can manipulate the graph structure could alter traffic patterns to gain some benefit (e.g., make more money by directing traffic to a toll road). This paper presents the Force Path Cut problem, in which an adversary remov… ▽ More

    Submitted 20 November, 2022; originally announced November 2022.

    Comments: 37 pages, 11 figures; Extended version of arXiv:2104.03761

  6. arXiv:2112.13168  [pdf, other

    q-bio.QM cs.LG

    AI-Bind: Improving Binding Predictions for Novel Protein Targets and Ligands

    Authors: Ayan Chatterjee, Robin Walters, Zohair Shafi, Omair Shafi Ahmed, Michael Sebek, Deisy Gysi, Rose Yu, Tina Eliassi-Rad, Albert-László Barabási, Giulia Menichetti

    Abstract: Identifying novel drug-target interactions (DTI) is a critical and rate limiting step in drug discovery. While deep learning models have been proposed to accelerate the identification process, we show that state-of-the-art models fail to generalize to novel (i.e., never-before-seen) structures. We first unveil the mechanisms responsible for this shortcoming, demonstrating how models rely on shortc… ▽ More

    Submitted 9 November, 2022; v1 submitted 24 December, 2021; originally announced December 2021.

    Comments: 83 pages, 26 figures, all references moved to a single section, new results added on AI interpretability, added comparison with MolTrans, added validation using gold standard experimental data

  7. arXiv:2107.03347  [pdf, other

    cs.SI

    Optimal Edge Weight Perturbations to Attack Shortest Paths

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Finding shortest paths in a given network (e.g., a computer network or a road network) is a well-studied task with many applications. We consider this task under the presence of an adversary, who can manipulate the network by perturbing its edge weights to gain an advantage over others. Specifically, we introduce the Force Path Problem as follows. Given a network, the adversary's goal is to make a… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

  8. arXiv:2104.03909  [pdf, other

    cs.CY cs.AI cs.LG

    RAWLSNET: Altering Bayesian Networks to Encode Rawlsian Fair Equality of Opportunity

    Authors: David Liu, Zohair Shafi, William Fleisher, Tina Eliassi-Rad, Scott Alfeld

    Abstract: We present RAWLSNET, a system for altering Bayesian Network (BN) models to satisfy the Rawlsian principle of fair equality of opportunity (FEO). RAWLSNET's BN models generate aspirational data distributions: data generated to reflect an ideally fair, FEO-satisfying society. FEO states that everyone with the same talent and willingness to use it should have the same chance of achieving advantageous… ▽ More

    Submitted 15 March, 2021; originally announced April 2021.

    Comments: 12 pages

  9. arXiv:2104.03761  [pdf, other

    cs.SI

    PATHATTACK: Attacking Shortest Paths in Complex Networks

    Authors: Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld

    Abstract: Shortest paths in complex networks play key roles in many applications. Examples include routing packets in a computer network, routing traffic on a transportation network, and inferring semantic distances between concepts on the World Wide Web. An adversary with the capability to perturb the graph might make the shortest path between two nodes route traffic through advantageous portions of the gr… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.