2022 IEEE 38th International Conference on Data Engineering (ICDE) 2022
DOI: 10.1109/icde53745.2022.00006
|View full text |Cite
|
Sign up to set email alerts
|

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…In the gray-box scenario, attackers leverage gradient-based strategies on the adjacency matrix to identify critical modifications. Various approaches exist for selecting edge alterations based on gradients [25][26][27][28]. These adversarial techniques pose a challenge to the robustness of graph-based anomaly detection systems, as they exploit vulnerabilities within the underlying graph structures and classification models.…”
Section: Adversarial Attacks On Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…In the gray-box scenario, attackers leverage gradient-based strategies on the adjacency matrix to identify critical modifications. Various approaches exist for selecting edge alterations based on gradients [25][26][27][28]. These adversarial techniques pose a challenge to the robustness of graph-based anomaly detection systems, as they exploit vulnerabilities within the underlying graph structures and classification models.…”
Section: Adversarial Attacks On Graphmentioning
confidence: 99%
“…A conventional technique employed for the optimization problem is gradient descent, as thoroughly discussed in previous works [24][25][26][27][28]. The initialization of B commences with a value of 0.5 and is refined through the update mechanism:…”
Section: Projection and Distribution Of Gradientmentioning
confidence: 99%
“…Extensive studies have demonstrated that GNNs are highly fragile to adversarial attacks [7,40,51,54,55]. The attackers can greatly degrade the performance of GNNs by limitedly modifying the graph data, namely structure and features.…”
Section: Robust Gnnsmentioning
confidence: 99%
“…Recent studies have shown that GNNs are vulnerable to adversarial attacks [7,40,51,54,55]. In other words, by limitedly rewiring the graph structure or just perturbing a small part of the node features, attackers can easily fool the GNNs to misclassify nodes in the graph.…”
Section: Introductionmentioning
confidence: 99%
“…However, most studies use one-hot vectors to encode a node's features and rely on a GNN to capture the global features of network snapshots. 2) Taking advantage of its message passing mechanism, GNNs have been developed to deal with various tasks over graph data [20], [21]. However, recent studies have shown that GNNs are vulnerable to adversarial attacks in delivering messages, achieved through malicious modification of their graph structure.…”
Section: Introductionmentioning
confidence: 99%