Adversarial Attack Algorithm for Introducing Degree Centrality Selection of Attack Nodes

被引:0
|
作者
Qian, Rong [1 ,2 ]
Xu, Xuefei [1 ]
Liu, Xiaoyu [3 ]
Zhang, Kejun [1 ,2 ]
Zeng, Junming [1 ]
Lyu, Zongfang [2 ]
Guo, Jinghui [1 ]
机构
[1] Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing,100070, China
[2] College of Computer Science and Technology, Xidian University, Xi’an,710071, China
[3] Department of Management, Beijing Electronic Science and Technology Institute, Beijing,100070, China
关键词
Convolutional neural networks - Graph algorithms - Graph neural networks - Network security;
D O I
10.3778/j.issn.1002-8331.2306-0265
中图分类号
学科分类号
摘要
Graph convolutional networks (GCN) are widely used in graph neural networks and play an important role in processing graph structured data. However, recent studies have shown that GCN is vulnerable to malicious attacks such as poisoning attacks. Of all the possible adversarial attacks against GCN, one particular approach is the TUA(target universal attack) against graph convolutional networks. In order to select attack nodes simply, the method adopts random selection strategy, which ignores the importance of neighbor to node, and has a negative impact on the success rate of attack. In response to this problem, adversarial attack algorithm based on degree centrality attack node selection strategy, adversarial attack algorithm based on degree centrality attack node selection strategy (DCANSS). Firstly, the method of selecting attack nodes is optimized, and the degree centrality is introduced to get the attack nodes. Secondly, the fake node is injected and connected to the attack node. Then, the auxiliary node is selected and the message passing mechanism of the graph convolutional network is applied to spread the node information, calculate the disturbance and assign the disturbance feature to the false node to complete the attack and achieve the misclassification goal. Experiments on three popular datasets show that when only three attack nodes and six fake nodes are used, the proposed attack has an average success rate of 90% against any victim node in the graph. By comparing DCANSS algorithm with TUA algorithm and other established baseline algorithms, the attack capability of DCANSS algorithm is further verified. © 2024 Journal of Computer Engineering and Applications Beijing Co., Ltd.; Science Press. All rights reserved.
引用
收藏
页码:285 / 293
相关论文
共 50 条
  • [31] Need for a Realistic Measure of Attack Severity in Centrality Based Node Attack Strategies
    John, Jisha Mariyam
    Lekha, Divya Sindhu
    COMPLEX NETWORKS & THEIR APPLICATIONS X, VOL 1, 2022, 1015 : 857 - 866
  • [32] Selection of Malicious Attack Nodes for Complex Networks Based on Structural Controllability
    Chen, Shiyu
    Wu, Hao
    Zhang, Ya
    2022 IEEE 17TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION, ICCA, 2022, : 636 - 641
  • [33] Causality adversarial attack generation algorithm for intelligent unmanned communication system
    Yu S.
    Xu W.
    Yao J.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (01): : 54 - 62
  • [34] Optimized Gradient Boosting Black-Box Adversarial Attack Algorithm
    Liu, Mengting
    Ling, Jie
    Computer Engineering and Applications, 2023, 59 (18) : 260 - 267
  • [35] Quantum Adversarial Attack Generation Algorithm Based on Variational Quantum Classifiers
    Hou X.
    Wu R.
    Wang Z.
    Wang X.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (02): : 162 - 167
  • [36] An improved genetic algorithm and its application in neural network adversarial attack
    Yang, Dingming
    Yu, Zeyu
    Yuan, Hongqiang
    Cui, Yanrong
    PLOS ONE, 2022, 17 (05):
  • [37] Gradient-free adversarial attack algorithm based on differential evolution
    Da, Qingan
    Zhang, Guoyin
    Li, Sizhao
    Liu, Zechao
    Wang, Wenshan
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2023, 22 (04) : 217 - 226
  • [38] Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
    Yang, Puyudi
    Chen, Jianbo
    Hsieh, Cho-Jui
    Wang, Jane-Ling
    Jordan, Michael, I
    JOURNAL OF MACHINE LEARNING RESEARCH, 2020, 21
  • [39] Enhancing adversarial attack transferability with multi-scale feature attack
    Sun, Caixia
    Zou, Lian
    Fan, Cien
    Shi, Yu
    Liu, Yifeng
    INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2021, 19 (02)
  • [40] Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
    Dai, Zeyu
    Liu, Shengcai
    Li, Qing
    Tang, Ke
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (03)