2020
DOI: 10.48550/arxiv.2004.13825
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Scalable Attack on Graph Data by Injecting Vicious Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…A more realistic scenario, graph injection attack (GIA), is studied in [17,19], which injects new vicious nodes instead of modifying the original graph. [17] proposes Node Injection Poisoning Attack (NIPA) based on reinforcement learning strategy.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A more realistic scenario, graph injection attack (GIA), is studied in [17,19], which injects new vicious nodes instead of modifying the original graph. [17] proposes Node Injection Poisoning Attack (NIPA) based on reinforcement learning strategy.…”
Section: Related Workmentioning
confidence: 99%
“…In view of the gap, very recent efforts [17,19], including the KDD-CUP 2020 competition 1 , have been devoted to adversarial attacks on GNNs under the setting of graph injection attack (GIA). Specifically, the GIA task in KDD-CUP 2020 is formulated as follows: (1) Black-box attack, where the adversaries do not have access to the target GNN model or the correct labels of the target nodes; (2) Evasion attack, where the attacks can only be performed during the inference stage.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the GreedyAttack and GreedyGAN proposed by Xiaoyun Wang et al [12] conducted targeted node attacks by adding fake nodes directly to the victim nodes. Jihong Wang et al [13] introduce the approximate fast gradient sign method, which adds a vicious node between the victim node and other nodes so that the victim node will be misclassified. However, most existing fake node attacks ( [13,12,14] ) are not designed to conduct universal adversarial attacks.…”
Section: Adversarial Attack In Graph Structured Datamentioning
confidence: 99%
“…Jihong Wang et al [13] introduce the approximate fast gradient sign method, which adds a vicious node between the victim node and other nodes so that the victim node will be misclassified. However, most existing fake node attacks ( [13,12,14] ) are not designed to conduct universal adversarial attacks. In the TUA proposed in this paper, the fake nodes act as the 2-hop neighbor of the victim node.…”
Section: Adversarial Attack In Graph Structured Datamentioning
confidence: 99%