Attack Graph Convolutional Networks by Adding Fake Nodes

10/25/2018
by   Xiaoyun Wang, et al.
0

Graph convolutional networks (GCNs) have been widely used for classifying graph nodes in the semi-supervised setting. Previous work have shown that GCNs are vulnerable to the perturbation on adjacency and feature matrices of existing nodes. However, it is unrealistic to change existing nodes in many applications, such as existing users in social networks. In this paper, we design algorithms to attack GCNs by adding fake nodes. A greedy algorithm is proposed to generate adjacency and feature matrices of fake nodes, aiming to minimize the classification accuracy on the existing nodes. In additional, we introduce a discriminator to classify fake nodes from real nodes, and propose a Greedy-GAN attack to simultaneously update the discriminator and the attacker, to make fake nodes indistinguishable to the real ones. Our non-targeted attack decreases the accuracy of GCN down to 0.10, and our targeted attack reaches a success rate of 99 single target node.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/29/2020

A Targeted Universal Attack on Graph Convolutional Network

Graph-structured data exist in numerous applications in real life. As a ...
research
09/27/2021

Query-based Adversarial Attacks on Graph with Fake Nodes

While deep neural networks have achieved great success on the graph anal...
research
02/28/2023

A semantic backdoor attack against Graph Convolutional Networks

Graph Convolutional Networks (GCNs) have been very effective in addressi...
research
01/11/2023

Determinate Node Selection for Semi-supervised Classification Oriented Graph Convolutional Networks

Graph Convolutional Networks (GCNs) have been proved successful in the f...
research
02/24/2021

Graphfool: Targeted Label Adversarial Attack on Graph Embedding

Deep learning is effective in graph analysis. It is widely applied in ma...
research
10/19/2019

Improving Privacy in Graphs Through Node Addition

The rapid growth of computer systems which generate graph data necessita...
research
03/06/2019

Attack Graph Obfuscation

Before executing an attack, adversaries usually explore the victim's net...

Please sign up or login with your details

Forgot password? Click here to reset