Proceedings of the 30th ACM International Conference on Information &Amp; Knowledge Management 2021
DOI: 10.1145/3459637.3482393
|View full text |Cite
|
Sign up to set email alerts
|

Single Node Injection Attack against Graph Neural Networks

Abstract: Node injection attack on Graph Neural Networks (GNNs) is an emerging and practical attack scenario that the attacker injects malicious nodes rather than modifying original nodes or edges to affect the performance of GNNs. However, existing node injection attacks ignore extremely limited scenarios, namely the injected nodes might be excessive such that they may be perceptible to the target GNN. In this paper, we focus on an extremely limited scenario of single node injection evasion attack, i.e., the attacker i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(33 citation statements)
references
References 27 publications
0
25
0
Order By: Relevance
“…Knowledge White-box [201], [211], [28], [37], [62] Black-box [37], [122], [244], [28], [245], [211], [188], [172], [19], [24] Capability Evasion Attack [201], [211], [28], [37], [179], [122], [121], [122], [62] Poisoning Attack [244], [245], [172], [19], [24], [188], [203], [233], [105], [62] Attackers' Goal…”
Section: Aspect Category Referencesmentioning
confidence: 99%
See 4 more Smart Citations
“…Knowledge White-box [201], [211], [28], [37], [62] Black-box [37], [122], [244], [28], [245], [211], [188], [172], [19], [24] Capability Evasion Attack [201], [211], [28], [37], [179], [122], [121], [122], [62] Poisoning Attack [244], [245], [172], [19], [24], [188], [203], [233], [105], [62] Attackers' Goal…”
Section: Aspect Category Referencesmentioning
confidence: 99%
“…Targeted Attack [37], [188], [179], [203], [233], [244], [122], [28], [105], [19] Untargeted Attack [172]. [245], [211], [62], [19], [201], [121], [24] Trade off Between Privacy and Utility.…”
Section: Aspect Category Referencesmentioning
confidence: 99%
See 3 more Smart Citations