2021
DOI: 10.1016/j.neucom.2020.07.126
|View full text |Cite
|
Sign up to set email alerts
|

DeepEC: Adversarial attacks against graph structure prediction models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 51 publications
0
1
0
Order By: Relevance
“…The successful portability of attacks against various link prediction heuristics from the existing literature is highlighted, demonstrating the effectiveness and broad applicability of the proposed competitive methods. Existing competing attacks (mentioned in [3,9,4,12]) often operate in a "white box" configuration, assuming full access to the machine learning model parameters. However, the passage notes the unrealistic nature of this setting when the model parameters are unknown to the attacker, emphasizing the importance of considering realistic scenarios, especially in the "black box" configuration.…”
Section: Generative Attacks Employ Reproductive Methods To Create Adv...mentioning
confidence: 99%
See 1 more Smart Citation
“…The successful portability of attacks against various link prediction heuristics from the existing literature is highlighted, demonstrating the effectiveness and broad applicability of the proposed competitive methods. Existing competing attacks (mentioned in [3,9,4,12]) often operate in a "white box" configuration, assuming full access to the machine learning model parameters. However, the passage notes the unrealistic nature of this setting when the model parameters are unknown to the attacker, emphasizing the importance of considering realistic scenarios, especially in the "black box" configuration.…”
Section: Generative Attacks Employ Reproductive Methods To Create Adv...mentioning
confidence: 99%
“…Carlini and Wagner [10,22] propose a method that comes close to the goal by utilizing simpler linear functions. [3] assumes linearity near the input, contributing to the minimal interference approach.…”
Section: Related Workmentioning
confidence: 99%
“…It makes the predictive algorithms worse than random guesses. Xian et al [62] proposed a deep architecture-based framework to analyze the vulnerability of link prediction. The framework perturbed the network structure to adversarial attack the link prediction methods.…”
Section: Network Structural Perturbationmentioning
confidence: 99%