2020
DOI: 10.1007/s10618-020-00696-7
|View full text |Cite
|
Sign up to set email alerts
|

Scalable attack on graph data by injecting vicious nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 40 publications
(30 citation statements)
references
References 22 publications
0
30
0
Order By: Relevance
“…Straightforwardly, GIA follows the evasion attack setting in which the attack is only performed to the target model during inference. This makes it different from the poison attack [17,19], where the target model is retrained on the attacked graph.…”
Section: Problem Definitionmentioning
confidence: 99%
See 4 more Smart Citations
“…Straightforwardly, GIA follows the evasion attack setting in which the attack is only performed to the target model during inference. This makes it different from the poison attack [17,19], where the target model is retrained on the attacked graph.…”
Section: Problem Definitionmentioning
confidence: 99%
“…In view of the gap, very recent efforts [17,19], including the KDD-CUP 2020 competition 1 , have been devoted to adversarial attacks on GNNs under the setting of graph injection attack (GIA). Specifically, the GIA task in KDD-CUP 2020 is formulated as follows:…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations