Scalable Attack on Graph Data by Injecting Vicious Nodes

04/22/2020
by   Jihong Wang, et al.
0

Recent studies have shown that graph convolution networks (GCNs) are vulnerable to carefully designed attacks, which aim to cause misclassification of a specific node on the graph with unnoticeable perturbations. However, a vast majority of existing works cannot handle large-scale graphs because of their high time complexity. Additionally, existing works mainly focus on manipulating existing nodes on the graph, while in practice, attackers usually do not have the privilege to modify information of existing nodes. In this paper, we develop a more scalable framework named Approximate Fast Gradient Sign Method (AFGSM) which considers a more practical attack scenario where adversaries can only inject new vicious nodes to the graph while having no control over the original graph. Methodologically, we provide an approximation strategy to linearize the model we attack and then derive an approximate closed-from solution with a lower time cost. To have a fair comparison with existing attack methods that manipulate the original graph, we adapt them to the new attack scenario by injecting vicious nodes. Empirical experimental results show that our proposed attack method can significantly reduce the classification accuracy of GCNs and is much faster than existing methods without jeopardizing the attack performance.

READ FULL TEXT
research
09/08/2020

Adversarial Attack on Large Scale Graph

Recent studies have shown that graph neural networks are vulnerable agai...
research
08/03/2022

Adversarial Camouflage for Node Injection Attack on Graphs

Node injection attacks against Graph Neural Networks (GNNs) have receive...
research
08/15/2023

Simple and Efficient Partial Graph Adversarial Attack: A New Perspective

As the study of graph neural networks becomes more intensive and compreh...
research
01/04/2023

GUAP: Graph Universal Attack Through Adversarial Patching

Graph neural networks (GNNs) are a class of effective deep learning mode...
research
03/25/2019

A Scalable and Optimal Graph-Search Method for Secure State Estimation

The growing complexity of modern Cyber-Physical Systems (CPS) and the fr...
research
09/14/2019

Node Injection Attacks on Graphs via Reinforcement Learning

Real-world graph applications, such as advertisements and product recomm...
research
05/19/2021

Graph Sanitation with Application to Node Classification

The past decades have witnessed the prosperity of graph mining, with a m...

Please sign up or login with your details

Forgot password? Click here to reset