Graph Adversarial Attack via Rewiring

被引:38
|
作者
Ma, Yao [1 ]
Wang, Suhang [2 ]
Derr, Tyler [3 ]
Wu, Lingfei [4 ]
Tang, Jiliang [5 ]
机构
[1] New Jersey Inst Technol, Newark, NJ 07102 USA
[2] Penn State Univ, University Pk, PA 16802 USA
[3] Vanderbilt Univ, 221 Kirkland Hall, Nashville, TN 37235 USA
[4] JDCOM Silicon Valley Res Ctr, Mountain View, CA USA
[5] Michigan State Univ, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
graph neural networks; adversarial attack; rewiring;
D O I
10.1145/3447548.3467416
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph Neural Networks (GNNs) have demonstrated their powerful capability in learning representations for graph-structured data. Consequently they have enhanced the performance of many graph-related tasks such as node classification and graph classification. However, it is evident from recent studies that GNNs are vulnerable to adversarial attacks. Their performance can be largely impaired by deliberately adding carefully created unnoticeable perturbations to the graph. Existing attacking methods often produce the perturbation by adding/deleting a few edges, which might be noticeable even when the number of modified edges is small. In this paper, we propose a graph rewiring operation to perform the attack. It can affect the graph in a less noticeable way compared to existing operations such as adding/deleting edges. We then utilize deep reinforcement learning to learn the strategy to effectively perform the rewiring operations. Experiments on real world graphs demonstrate the effectiveness of the proposed framework. To understand the proposed framework, we further analyze how its generated perturbation impacts the target model and the advantages of the rewiring operations.
引用
收藏
页码:1161 / 1169
页数:9
相关论文
共 50 条
  • [21] Bayesian Adversarial Attack on Graph Neural Networks (Student Abstract)
    Liu, Xiao
    Zhao, Jing
    Sun, Shiliang
    [J]. THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 13867 - 13868
  • [22] Adversarial Attack Framework on Graph Embedding Models With Limited Knowledge
    Chang, Heng
    Rong, Yu
    Xu, Tingyang
    Huang, Wenbing
    Zhang, Honglei
    Cui, Peng
    Wang, Xin
    Zhu, Wenwu
    Huang, Junzhou
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) : 4499 - 4513
  • [23] Adversarial Examples for Graph Data: Deep Insights into Attack and Defense
    Wu, Huijun
    Wang, Chen
    Tyshetskiy, Yuriy
    Docherty, Andrew
    Lu, Kai
    Zhu, Liming
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4816 - 4823
  • [24] Simple and Efficient Partial Graph Adversarial Attack: A New Perspective
    Zhu, Guanghui
    Chen, Mengyu
    Yuan, Chunfeng
    Huang, Yihua
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (08) : 4245 - 4259
  • [25] An effective targeted label adversarial attack on graph neural networks by strategically allocating the attack budget
    Cao, Feilong
    Chen, Qiyang
    Ye, Hailiang
    [J]. KNOWLEDGE-BASED SYSTEMS, 2024, 293
  • [26] ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space
    Wang, Haobo
    Zhu, Chenxi
    Cao, Yangjie
    Zhuang, Yan
    Li, Jie
    Chen, Xianfu
    [J]. ELECTRONICS, 2023, 12 (04)
  • [27] Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure
    Tian, Yunzhe
    Liu, Jiqiang
    Tong, Endong
    Niu, Wenjia
    Chang, Liang
    Chen, Qi Alfred
    Li, Gang
    Wang, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] Detecting falsified timestamps in evidence graph via attack graph
    Zhang, Yuqiang
    He, Jingsha
    Xu, Jing
    [J]. 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 369 - 374
  • [29] Adversarial Label-Flipping Attack and Defense for Graph Neural Networks
    Zhang, Mengmei
    Hu, Linmei
    Shi, Chuan
    Wang, Xiao
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 791 - 800
  • [30] Black-box Adversarial Attack and Defense on Graph Neural Networks
    Li, Haoyang
    Di, Shimin
    Li, Zijian
    Chen, Lei
    Cao, Jiannong
    [J]. 2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 1017 - 1030