Black-Box Attacks on Graph Neural Networks via White-Box Methods With Performance Guarantees

被引:0
|
作者
Yang, Jielong [1 ]
Ding, Rui [1 ]
Chen, Jianyu [2 ]
Zhong, Xionghu [3 ]
Zhao, Huarong [1 ]
Xie, Linbo [1 ]
机构
[1] Jiangnan Univ, Sch Internet Things Engn, Wuxi 214122, Jiangsu, Peoples R China
[2] Beihang Univ, Inst Artificial Intelligence, Beijing 100191, Peoples R China
[3] Hunan Univ, Sch Comp Sci & Technol, Changsha 410082, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
关键词
Glass box; Closed box; Mathematical models; Laplace equations; Training; Graph neural networks; Perturbation methods; Attack performance guarantees; black-box attack; graph neural network (GNN);
D O I
10.1109/JIOT.2024.3360982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graph adversarial attacks can be classified as either white-box or black-box attacks. White-box attackers typically exhibit better performance because they can exploit the known structure of victim models. However, in practical settings, most attackers generate perturbations under black-box conditions, where the victim model is unknown. A fundamental question is how to leverage a white-box attacker to attack a black-box model. Some current black-box attack approaches employ white-box techniques to attack a surrogate model, resulting in satisfactory outcomes. Nonetheless, such white-box attackers must be meticulously designed and lack theoretical assurances for attack effectiveness. In this article, we propose a novel framework that utilizes simple white-box techniques to conduct black-box attacks and provides the lower bound for attack performance. Specifically, we first employ a more comprehensive GCN technique named BiasGCN to approximate the victim model, and subsequently, use a simple white-box approach to attack the approximate model. We provide a generalization guarantee for our BiasGCN and employ it to obtain the lower bound on attack performance. Our method is evaluated on various data sets, and the experimental results indicate that our approach surpasses recently proposed baselines.
引用
收藏
页码:18193 / 18204
页数:12
相关论文
共 50 条
  • [31] Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function
    Wang, Binghui
    Lin, Minhua
    Zhou, Tianxiang
    Zhou, Pan
    Li, Ang
    Pang, Meng
    Li, Hai
    Chen, Yiran
    [J]. PROCEEDINGS OF THE 17TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, WSDM 2024, 2024, : 693 - 701
  • [32] Bayesian Proxy Modelling for Estimating Black Carbon Concentrations using White-Box and Black-Box Models
    Zaidan, Martha A.
    Wraith, Darren
    Boor, Brandon E.
    Hussein, Tareq
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (22):
  • [33] White-box testing by combining deduction-based specification extraction and black-box testing
    Beckert, Bernhard
    Gladisch, Christoph
    [J]. TESTS AND PROOFS, 2007, 4454 : 207 - +
  • [34] Quantum neural networks under depolarization noise: exploring white-box attacks and defenses
    Winderl, David
    Franco, Nicola
    Lorenz, Jeanette Miriam
    [J]. Quantum Machine Intelligence, 2024, 6 (02)
  • [35] Black-Box Testing of Deep Neural Networks
    Byun, Taejoon
    Rayadurgam, Sanjai
    Heimdahl, Mats P. E.
    [J]. 2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 309 - 320
  • [36] Evaluation of white-box versus black-box machine learning models in estimating ambient black carbon concentration
    Fung, Pak L.
    Zaidan, Martha A.
    Timonen, Hilkka
    Niemi, Jarkko, V
    Kousa, Anu
    Kuula, Joel
    Luoma, Krista
    Tarkoma, Sasu
    Petaja, Tuukka
    Kulmala, Markku
    Hussein, Tareq
    [J]. JOURNAL OF AEROSOL SCIENCE, 2021, 152
  • [37] Identification of flux checkpoints in a metabolic pathway through white-box, grey-box and black-box modeling approaches
    Lo-Thong, Ophelie
    Charton, Philippe
    Cadet, Xavier F.
    Grondin-Perez, Brigitte
    Saavedra, Emma
    Damour, Cedric
    Cadet, Frederic
    [J]. SCIENTIFIC REPORTS, 2020, 10 (01)
  • [38] Identification of flux checkpoints in a metabolic pathway through white-box, grey-box and black-box modeling approaches
    Ophélie Lo-Thong
    Philippe Charton
    Xavier F. Cadet
    Brigitte Grondin-Perez
    Emma Saavedra
    Cédric Damour
    Frédéric Cadet
    [J]. Scientific Reports, 10
  • [39] White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
    Gil, Yotam
    Chai, Yoav
    Gorodissky, Or
    Berant, Jonathan
    [J]. 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, 2019, : 1373 - 1379
  • [40] A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
    Mu, Jiaming
    Wang, Binghui
    Li, Qi
    Sun, Kun
    Xu, Mingwei
    Liu, Zhuotao
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 108 - 125