EDoG: Adversarial Edge Detection For Graph Neural Networks

被引:3
|
作者
Xu, Xiaojun [1 ]
Wang, Hanzhang [2 ]
Lal, Alok [2 ]
Gunter, Carl A. [1 ]
Li, Bo [1 ]
机构
[1] Univ Illinois, Champaign, IL 60680 USA
[2] eBay, San Jose, CA USA
关键词
D O I
10.1109/SaTML54575.2023.00027
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph Neural Networks (GNNs) have been widely applied to different tasks such as bioinformatics, drug design, and social networks. However, recent studies have shown that GNNs are vulnerable to adversarial attacks which aim to mislead the node (or subgraph) classification prediction by adding subtle perturbations. In particular, several attacks against GNNs have been proposed by adding/deleting a small amount of edges, which have caused serious security concerns. Detecting these attacks is challenging due to the small magnitude of perturbation and the discrete nature of graph data. In this paper, we propose a general adversarial edge detection pipeline EDoG without requiring knowledge of the attack strategies based on graph generation. Specifically, we propose a novel graph generation approach combined with link prediction to detect suspicious adversarial edges. To effectively train the graph generative model, we sample several sub-graphs from the given graph data. We show that since the number of adversarial edges is usually low in practice, with low probability the sampled sub-graphs will contain adversarial edges based on the union bound. In addition, considering the strong attacks which perturb a large number of edges, we propose a set of novel features to perform outlier detection as the preprocessing for our detection. Extensive experimental results on three real-world graph datasets including a private transaction rule dataset from a major company and two types of synthetic graphs with controlled properties (e.g., Erdos-Renyi and scale-free graphs) show that EDoG can achieve above 0.8 AUC against four state-of-the-art unseen attack strategies without requiring any knowledge about the attack type (e.g., degree of the target victim node); and around 0.85 with knowledge of the attack type. EDoG significantly outperforms traditional malicious edge detection baselines. We also show that an adaptive attack with full knowledge of our detection pipeline is difficult to bypass it. Our results shed light on several principles to improve the robustness of GNNs.
引用
收藏
页码:291 / 305
页数:15
相关论文
共 50 条
  • [31] Domain-Adversarial Graph Neural Networks for Text Classification
    Wu, Man
    Pan, Shirui
    Zhu, Xingquan
    Zhou, Chuan
    Pan, Lei
    2019 19TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2019), 2019, : 648 - 657
  • [32] Robust Heterogeneous Graph Neural Networks against Adversarial Attacks
    Zhang, Mengmei
    Wang, Xiao
    Zhu, Meiqi
    Shi, Chuan
    Zhang, Zhiqiang
    Zhou, Jun
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 4363 - 4370
  • [33] Robust Graph Neural Networks Against Adversarial Attacks via Jointly Adversarial Training
    Tian, Hu
    Ye, Bowei
    Zheng, Xiaolong
    Wu, Desheng Dash
    IFAC PAPERSONLINE, 2020, 53 (05): : 420 - 425
  • [34] Cellular neural networks for edge detection
    Grassi, Giuseppe
    Vecchio, Pietro
    Di Sciascio, Eugenio
    Grieco, Luigi A.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (04): : 1323 - 1328
  • [35] Edge detection with BP neural networks
    He, ZQ
    Siyal, MY
    ICSP '98: 1998 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1998, : 1382 - 1384
  • [36] Pruning graph neural networks by evaluating edge properties
    Wang, Li
    Huang, Wei
    Zhang, Miao
    Pan, Shirui
    Chang, Xiaojun
    Su, Steven Weidong
    Knowledge-Based Systems, 2022, 256
  • [37] Fuzzy neural networks for edge detection
    Lu, SW
    Wang, ZQ
    1997 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS I AND II: ENGINEERING INNOVATION: VOYAGE OF DISCOVERY, 1997, : 446 - 449
  • [38] Pruning graph neural networks by evaluating edge properties
    Wang, Li
    Huang, Wei
    Zhang, Miao
    Pan, Shirui
    Chang, Xiaojun
    Su, Steven Weidong
    KNOWLEDGE-BASED SYSTEMS, 2022, 256
  • [39] Toward Certified Robustness of Graph Neural Networks in Adversarial AIoT Environments
    Lai, Yuni
    Zhou, Jialong
    Zhang, Xiaoge
    Zhou, Kai
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13920 - 13932
  • [40] Neighbor-Anchoring Adversarial Graph Neural Networks (Extended Abstract)
    Liu, Zemin
    Fang, Yuan
    Liu, Yong
    Zheng, Vincent W.
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 1571 - 1572