Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &Amp; Data Mining 2019
DOI: 10.1145/3292500.3330851
|View full text |Cite
|
Sign up to set email alerts
|

Robust Graph Convolutional Networks Against Adversarial Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
220
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 308 publications
(244 citation statements)
references
References 13 publications
2
220
0
Order By: Relevance
“…Specifically, an attacker can slightly perturb the graph structure and/or node features to mislead the predictions made by GNNs. Some empirical defenses [38,39,41] were proposed to defend against such attacks. However, these methods do not have certified robustness guarantees.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, an attacker can slightly perturb the graph structure and/or node features to mislead the predictions made by GNNs. Some empirical defenses [38,39,41] were proposed to defend against such attacks. However, these methods do not have certified robustness guarantees.…”
Section: Related Workmentioning
confidence: 99%
“…For example, Wu et al [35] utilize the Jaccard similarity of features to prune perturbed graphs with the assumption that connected nodes should have high feature similarity. RGCN in [39] adopts Gaussian distributions as the node representations in each convolutional layer to absorb the e ects of adversarial changes in the variances of the Gaussian distributions. e basic idea of aforementioned robust GNNs against poisoning a ack is to alleviate the negative e ects of the perturbed edges.…”
Section: Adversarial Attack and Defense On Graphsmentioning
confidence: 99%
“…Jaccard similarity is used sparse features and Cosine similarity is adopted for dense features. • RGCN [39]: RGCN aims to defend against adversarial edges with Gaussian distributions as the latent node representation in hidden layers to absorb the negative e ects of adversarial edges. • VPN [17]: Di erent from GCN, parameters of VPN are trained on a family of powered graphs of G. e family of powered graphs increases the spatial eld of normal graph convolution, thus improves the robustness.…”
Section: Baselinesmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiple CDAs are available to analyze the network structure but, a little work has been done to conceal the community information of the nodes in the network. 10,[31][32][33][34] Researchers found the motivation behind the hiding of information and discussed various deception mechanisms in the social network. Caspi and Gorsky 35 performed a web-based survey on the motivation and emotions for Israeli users' online deception.…”
Section: Introductionmentioning
confidence: 99%