Adversarial Attack and Defense on Discrete Time Dynamic Graphs

被引:0
|
作者
Zhao, Ziwei [1 ]
Yang, Yu [2 ]
Yin, Zikai [1 ]
Xu, Tong [1 ]
Zhu, Xi [1 ]
Lin, Fake [1 ]
Li, Xueying [3 ]
Chen, Enhong [1 ]
机构
[1] Univ Sci & Technol China, State Key Lab Cognit Intelligence, Hefei 230026, Peoples R China
[2] City Univ Hong Kong, Sch Data Sci, Kowloon Tong, Hong Kong, Peoples R China
[3] Alibaba Grp, Hangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Training; Robustness; Perturbation methods; Learning systems; Optimization; Topology; Task analysis; Adversarial attack; dynamic graph representation; graph learning; robust training; OPTIMIZATION; QUERIES;
D O I
10.1109/TKDE.2024.3438238
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph learning methods have achieved remarkable performance in various domains such as social recommendation, financial fraud detection, and so on. In real applications, the underlying graph is often dynamically evolving and thus, some recent studies focus on integrating the temporal topology information of graphs into the GNN for learning graph embedding. However, the robustness of training GNNs for dynamic graphs has not been discussed so far. The major reason is how to attack dynamic graph embedding still remains largely untouched, let alone how to defend against the attacks. To enable robust training of GNNs for dynamic graphs, in this paper, we investigate the problem of how to generate attacks and defend against attacks for dynamic graph embedding. Attacking dynamic graph embedding is more challenging than attacking static graph embedding as we need to understand the temporal dynamics of graphs as well as its impact on the embedding and the injected perturbations should be distinguished from the natural evolution. In addition, the defense is very challenging as the perturbations may be hidden within the natural evolution. To tackle these technical challenges, in this paper, we first develop a novel gradient-based attack method from an optimization perspective to generate perturbations to fool dynamic graph learning methods, where a key idea is to use gradient dynamics to attack the natural dynamics of the graph. Further, we borrow the idea of the attack method and integrate it with adversarial training to train a more robust dynamic graph learning method to defend against hand-crafted attacks. Finally, extensive experiments on two real-world datasets demonstrate the effectiveness of the proposed attack and defense method, where our defense method not only achieves comparable performance on clean graphs but also significantly increases the defense performance on attacked graphs.
引用
收藏
页码:7600 / 7611
页数:12
相关论文
共 50 条
  • [21] Review of Artificial Intelligence Adversarial Attack and Defense Technologies
    Qiu, Shilin
    Liu, Qihe
    Zhou, Shijie
    Wu, Chunjiang
    APPLIED SCIENCES-BASEL, 2019, 9 (05):
  • [22] Generative Adversarial Networks: A Survey on Attack and Defense Perspective
    Zhang, Chenhan
    Yu, Shui
    Tian, Zhiyi
    Yu, James J. Q.
    ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [23] GradMDM: Adversarial Attack on Dynamic Networks
    Pan, Jianhong
    Foo, Lin Geng
    Zheng, Qichen
    Fan, Zhipeng
    Rahmani, Hossein
    Ke, Qiuhong
    Liu, Jun
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (09) : 11374 - 11381
  • [24] Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
    Yang, Puyudi
    Chen, Jianbo
    Hsieh, Cho-Jui
    Wang, Jane-Ling
    Jordan, Michael, I
    JOURNAL OF MACHINE LEARNING RESEARCH, 2020, 21
  • [25] Conditional Generative Adversarial Networks with Adversarial Attack and Defense for Generative Data Augmentation
    Baek, Francis
    Kim, Daeho
    Park, Somin
    Kim, Hyoungkwan
    Lee, SangHyun
    JOURNAL OF COMPUTING IN CIVIL ENGINEERING, 2022, 36 (03)
  • [26] Greedy attack and gumbel attack: Generating adversarial examples for discrete data
    Yang, Puyudi
    Chen, Jianbo
    Hsieh, Cho-Jui
    Wang, Jane-Ling
    Jordan, Michael I.
    Journal of Machine Learning Research, 2020, 21
  • [27] Attackability Characterization of Adversarial Evasion Attack on Discrete Data
    Wang, Yutong
    Han, Yufei
    Bao, Hongyan
    Shen, Yun
    Ma, Fenglong
    Li, Jin
    Zhang, Xiangliang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 1415 - 1425
  • [28] A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks
    Deldjoo, Yashar
    Di Noia, Tommaso
    Merra, Felice Antonio
    ACM COMPUTING SURVEYS, 2021, 54 (02)
  • [29] Adversarial Defense on Harmony: Reverse Attack for Robust AI Models Against Adversarial Attacks
    Kim, Yebon
    Jung, Jinhyo
    Kim, Hyunjun
    So, Hwisoo
    Ko, Yohan
    Shrivastava, Aviral
    Lee, Kyoungwoo
    Hwang, Uiwon
    IEEE ACCESS, 2024, 12 : 176485 - 176497
  • [30] Adversarial attack defense algorithm based on convolutional neural network
    Zhang, Chengyuan
    Wang, Ping
    NEURAL COMPUTING & APPLICATIONS, 2023, 36 (17): : 9723 - 9735