Adversarial Attack Algorithm for Introducing Degree Centrality Selection of Attack Nodes

被引:0
|
作者
Qian, Rong [1 ,2 ]
Xu, Xuefei [1 ]
Liu, Xiaoyu [3 ]
Zhang, Kejun [1 ,2 ]
Zeng, Junming [1 ]
Lyu, Zongfang [2 ]
Guo, Jinghui [1 ]
机构
[1] Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing,100070, China
[2] College of Computer Science and Technology, Xidian University, Xi’an,710071, China
[3] Department of Management, Beijing Electronic Science and Technology Institute, Beijing,100070, China
关键词
Convolutional neural networks - Graph algorithms - Graph neural networks - Network security;
D O I
10.3778/j.issn.1002-8331.2306-0265
中图分类号
学科分类号
摘要
Graph convolutional networks (GCN) are widely used in graph neural networks and play an important role in processing graph structured data. However, recent studies have shown that GCN is vulnerable to malicious attacks such as poisoning attacks. Of all the possible adversarial attacks against GCN, one particular approach is the TUA(target universal attack) against graph convolutional networks. In order to select attack nodes simply, the method adopts random selection strategy, which ignores the importance of neighbor to node, and has a negative impact on the success rate of attack. In response to this problem, adversarial attack algorithm based on degree centrality attack node selection strategy, adversarial attack algorithm based on degree centrality attack node selection strategy (DCANSS). Firstly, the method of selecting attack nodes is optimized, and the degree centrality is introduced to get the attack nodes. Secondly, the fake node is injected and connected to the attack node. Then, the auxiliary node is selected and the message passing mechanism of the graph convolutional network is applied to spread the node information, calculate the disturbance and assign the disturbance feature to the false node to complete the attack and achieve the misclassification goal. Experiments on three popular datasets show that when only three attack nodes and six fake nodes are used, the proposed attack has an average success rate of 90% against any victim node in the graph. By comparing DCANSS algorithm with TUA algorithm and other established baseline algorithms, the attack capability of DCANSS algorithm is further verified. © 2024 Journal of Computer Engineering and Applications Beijing Co., Ltd.; Science Press. All rights reserved.
引用
收藏
页码:285 / 293
相关论文
共 50 条
  • [41] AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems
    Patnaik, Sai Amrit
    Chansoriya, Shivali
    Namboodiri, Anoop M.
    Jain, Anil K.
    2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,
  • [42] A method for filtering the attack pairs of adversarial examples based on attack distance
    Liu H.
    Fang Y.
    Wen W.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 339 - 347
  • [43] Greedy attack and gumbel attack: Generating adversarial examples for discrete data
    Yang, Puyudi
    Chen, Jianbo
    Hsieh, Cho-Jui
    Wang, Jane-Ling
    Jordan, Michael I.
    Journal of Machine Learning Research, 2020, 21
  • [44] BERT-ATTACK: Adversarial Attack Against BERT Using BERT
    Li, Linyang
    Ma, Ruotian
    Guo, Qipeng
    Xue, Xiangyang
    Qiu, Xipeng
    PROCEEDINGS OF THE 2020 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP), 2020, : 6193 - 6202
  • [45] Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples
    Zhao, Zhe
    Chen, Guangke
    Liu, Tong
    Li, Taishan
    Song, Fu
    Wang, Jingyi
    Sun, Jun
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (03)
  • [46] Design and implementation of an efficient attack resilient computation algorithm in WSN nodes
    A. Saravanaselvan
    B. Paramasivan
    Cluster Computing, 2019, 22 : 3301 - 3311
  • [47] Complex Network Nodes Attack Method based on Improved Genetic Algorithm
    Wang Xun
    Yao Peiyang
    Zhang Jieyong
    Wan Lujun
    Chi Wensheng
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 5210 - 5216
  • [48] Design and implementation of an efficient attack resilient computation algorithm in WSN nodes
    Saravanaselvan, A.
    Paramasivan, B.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3301 - S3311
  • [49] SPARSE ADVERSARIAL ATTACK FOR VIDEO VIA GRADIENT-BASED KEYFRAME SELECTION
    Xu, Yixiao
    Liu, Xiaolei
    Yin, Mingyong
    Hu, Teng
    Ding, Kangyi
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2874 - 2878
  • [50] TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack
    Wei, Yier
    Gao, Haichang
    Wang, Yufei
    Liu, Huan
    Gao, Yipeng
    Luo, Sainan
    Guo, Qianwen
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT V, 2023, 14258 : 193 - 205