Adversarial Attack and Defense on Discrete Time Dynamic Graphs

被引:0
|
作者
Zhao, Ziwei [1 ]
Yang, Yu [2 ]
Yin, Zikai [1 ]
Xu, Tong [1 ]
Zhu, Xi [1 ]
Lin, Fake [1 ]
Li, Xueying [3 ]
Chen, Enhong [1 ]
机构
[1] Univ Sci & Technol China, State Key Lab Cognit Intelligence, Hefei 230026, Peoples R China
[2] City Univ Hong Kong, Sch Data Sci, Kowloon Tong, Hong Kong, Peoples R China
[3] Alibaba Grp, Hangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Training; Robustness; Perturbation methods; Learning systems; Optimization; Topology; Task analysis; Adversarial attack; dynamic graph representation; graph learning; robust training; OPTIMIZATION; QUERIES;
D O I
10.1109/TKDE.2024.3438238
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph learning methods have achieved remarkable performance in various domains such as social recommendation, financial fraud detection, and so on. In real applications, the underlying graph is often dynamically evolving and thus, some recent studies focus on integrating the temporal topology information of graphs into the GNN for learning graph embedding. However, the robustness of training GNNs for dynamic graphs has not been discussed so far. The major reason is how to attack dynamic graph embedding still remains largely untouched, let alone how to defend against the attacks. To enable robust training of GNNs for dynamic graphs, in this paper, we investigate the problem of how to generate attacks and defend against attacks for dynamic graph embedding. Attacking dynamic graph embedding is more challenging than attacking static graph embedding as we need to understand the temporal dynamics of graphs as well as its impact on the embedding and the injected perturbations should be distinguished from the natural evolution. In addition, the defense is very challenging as the perturbations may be hidden within the natural evolution. To tackle these technical challenges, in this paper, we first develop a novel gradient-based attack method from an optimization perspective to generate perturbations to fool dynamic graph learning methods, where a key idea is to use gradient dynamics to attack the natural dynamics of the graph. Further, we borrow the idea of the attack method and integrate it with adversarial training to train a more robust dynamic graph learning method to defend against hand-crafted attacks. Finally, extensive experiments on two real-world datasets demonstrate the effectiveness of the proposed attack and defense method, where our defense method not only achieves comparable performance on clean graphs but also significantly increases the defense performance on attacked graphs.
引用
收藏
页码:7600 / 7611
页数:12
相关论文
共 50 条
  • [31] Gradient Sign Inversion: Making an Adversarial Attack a Good Defense
    Ji, Xiaojian
    Dong, Li
    Wang, Rangding
    Yan, Diqun
    Yin, Yang
    Tian, Jinyu
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [32] Autonomous Driving Model Defense Study on Hijacking Adversarial Attack
    Shibly, Kabid Hassan
    Hossain, Md Delwar
    Inoue, Hiroyuki
    Taenaka, Yuzo
    Kadobayashi, Youki
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2022, PT IV, 2022, 13532 : 546 - 557
  • [33] Adversarial Attack and Defense in Breast Cancer Deep Learning Systems
    Li, Yang
    Liu, Shaoying
    BIOENGINEERING-BASEL, 2023, 10 (08):
  • [34] Adversarial Metric Attack and Defense for Person Re-Identification
    Bai, Song
    Li, Yingwei
    Zhou, Yuyin
    Li, Qizhu
    Torr, Philip H. S.
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2021, 43 (06) : 2119 - 2126
  • [35] Adversarial Sample Attack and Defense Method for Encrypted Traffic Data
    Ding, Yi
    Zhu, Guiqin
    Chen, Dajiang
    Qin, Xue
    Cao, Mingsheng
    Qin, Zhiguang
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 18024 - 18039
  • [36] Towards Robust Ensemble Defense Against Adversarial Examples Attack
    Mani, Nag
    Moh, Melody
    Moh, Teng-Sheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [37] Adversarial Attack and Defense for Webshell Detection on Machine Learning Models
    Zhang, Qian
    Chen, Lishen
    Yan, Qiao
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 33 - 41
  • [38] Adversarial attack and defense strategies for deep speaker recognition systems
    Jati, Arindam
    Hsu, Chin-Cheng
    Pal, Monisankha
    Peri, Raghuveer
    AbdAlmageed, Wael
    Narayanan, Shrikanth
    COMPUTER SPEECH AND LANGUAGE, 2021, 68
  • [39] Attack Agnostic Adversarial Defense via Visual Imperceptible Bound
    Chhabra, Saheb
    Agarwal, Akshay
    Singh, Richa
    Vatsa, Mayank
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 5302 - 5309
  • [40] Adversarial Attack and Defense of YOLO Detectors in Autonomous Driving Scenarios
    Choi, Jung Im
    Tian, Qing
    2022 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2022, : 1011 - 1017