Scalable Attack on Graph Data by Important Nodes

被引:0
|
作者
Hu, Wenjiang [1 ]
Ma, Mingda [1 ]
Jiang, Yanan [1 ]
Xia, Hui [1 ]
机构
[1] Ocean Univ China, Fac Informat Sci & Engn, Qingdao 266100, Peoples R China
基金
中国国家自然科学基金;
关键词
Adversarial attack; Graph neural networks; Important node; Time efficiency; Network robustness;
D O I
10.1007/978-981-97-5501-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research shows that graph neural networks (GNNs) are easily disrupted due to the lack of robustness, a phenomenon that poses a serious security threat. Currently, most efforts to attack GNNs mainly use gradient information to guide the attacks and achieve superior performance. However, gradient-based attacks often lead to suboptimal results due to the discrete structure of graph data. The high complexity of time and space for large-scale graphs also take away the advantage of gradient attacks. In this work, we propose an attack method based on Important Nodes Controllable Labels (INCLA), which finds the set of important nodes for each class in the graph that have a great influence on the network during the graph convolution process and connects the target nodes to the important nodes to achieve the attack effect. In addition, since the gradient optimization attacks in graph neural networks are all salience attacks, which lead to their poor unnoticeability. We construct more unnoticeable adversarial examples based on the association between target nodes and important nodes, and use the Degree Assortativity Change (DAC) metric and Homophily Ratio Change (HRC) metric for verification. Extensive experimental results show that INCLA can significantly improve the time efficiency while maintaining the attack performance compared to the state-of-the-art adversarial attacks with the same attack budget.
引用
收藏
页码:176 / 188
页数:13
相关论文
共 50 条
  • [1] Scalable attack on graph data by injecting vicious nodes
    Wang, Jihong
    Luo, Minnan
    Suya, Fnu
    Li, Jundong
    Yang, Zijiang
    Zheng, Qinghua
    DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 34 (05) : 1363 - 1389
  • [2] Scalable attack on graph data by injecting vicious nodes
    Jihong Wang
    Minnan Luo
    Fnu Suya
    Jundong Li
    Zijiang Yang
    Qinghua Zheng
    Data Mining and Knowledge Discovery, 2020, 34 : 1363 - 1389
  • [3] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
  • [4] A scalable representation towards attack graph generation
    Bhattacharya, Somak
    Malhotra, Samresh
    Ghsoh, S. K.
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
  • [5] Adversarial Attack on Graph Structured Data
    Dai, Hanjun
    Li, Hui
    Tian, Tian
    Wang, Lin
    Zhu, Jun
    Song, Le
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80
  • [6] A Targeted Universal Attack on Graph Convolutional Network by Using Fake Nodes
    Jiazhu Dai
    Weifeng Zhu
    Xiangfeng Luo
    Neural Processing Letters, 2022, 54 : 3321 - 3337
  • [7] A Targeted Universal Attack on Graph Convolutional Network by Using Fake Nodes
    Dai, Jiazhu
    Zhu, Weifeng
    Luo, Xiangfeng
    NEURAL PROCESSING LETTERS, 2022, 54 (04) : 3321 - 3337
  • [8] Adversarial Attack and Defense on Graph Data: A Survey
    Sun, Lichao
    Dou, Yingtong
    Yang, Carl
    Zhang, Kai
    Wang, Ji
    Yu, Philip S.
    He, Lifang
    Li, Bo
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7693 - 7711
  • [9] Identifying and Characterizing Nodes Important to Community Structure Using the Spectrum of the Graph
    Wang, Yang
    Di, Zengru
    Fan, Ying
    PLOS ONE, 2011, 6 (11):
  • [10] Improving attack graph visualization through data reduction and attack grouping
    Homer, John
    Varikuti, Ashok
    Ou, Xinming
    McQucen, Miles A.
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 68 - +