Topology-Aware Node Injection Attacks against graph neural networks

被引:0
|
作者
Su, Linlin [1 ,2 ,3 ]
Wang, Jinyan [1 ,2 ,3 ]
Gan, Zeming [3 ]
Li, De [3 ]
机构
[1] Guangxi Normal Univ, Key Lab Educ Blockchain & Intelligent Technol, Minist Educ, Guilin 541004, Peoples R China
[2] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin, Peoples R China
[3] Guangxi Normal Univ, Sch Comp Sci & Engn, Guilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Graph neural networks; Adversarial attack; Node injection attack; Node classification;
D O I
10.1016/j.neucom.2024.129128
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph neural networks (GNNs) are widely applied in real-life scenarios due to their excellent performance in processing graph data. Meanwhile, GNNs are vulnerable to the node injection attack (NIA). The attacker can significantly reduce the effectiveness of GNNs by injecting only a few malicious nodes into the graph. Existing topology construction approaches for NIA are often either random or computationally expensive, which limits the effectiveness of attack strategies and hinders their applicability to large-scale graphs. In this work, we propose a novel NIA method, named Topology-Aware Node Injection Attack (TANIA), which achieves both high attack effectiveness and scalability. TANIA comprises a two-stage topology construction strategy and an adaptive feature optimization module. Specifically, TANIA first selects nodes with weak information-aware ability as the candidate neighbor set to scale down the topology construction search space of the injected nodes. Then, it establishes connections for the injected nodes following the best wrong class consistency strategy to refine the topology for an effective attack with a limited budget. Based on the reconstructed topology, TANIA adaptively optimizes the features of the injected nodes to enhance the attack ability. The experimental results show that TANIA exhibits outstanding attack performance against 14 GNNs compared with eight representative NIA methods while maintaining scalability on large graph scenarios.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Evaluation of Topology-Aware Broadcast Algorithms for Dragonfly Networks
    Dorier, Matthieu
    Mubarak, Misbah
    Ross, Rob
    Li, Jianping Kelvin
    Carothers, Christopher D.
    Ma, Kwan-Liu
    2016 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2016, : 40 - 49
  • [32] Topology-Aware Incentive Mechanism for Cooperative Relay Networks
    Zheng, Zijie
    Gao, Lin
    Song, Lingyang
    Huang, Jianwei
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [33] The Design of Topology-Aware Overlay Networks for Ubiquitous Applications
    Chiu, Chuan-Feng
    Hsu, Steen J.
    Jan, Sen-Ren
    Lyu, Shao-Min
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 229 - 234
  • [34] Graph Structure Reshaping Against Adversarial Attacks on Graph Neural Networks
    Wang, Haibo
    Zhou, Chuan
    Chen, Xin
    Wu, Jia
    Pan, Shirui
    Li, Zhao
    Wang, Jilong
    Yu, Philip S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (11) : 6344 - 6357
  • [35] Improving multipath reliability in topology-aware overlay networks
    Tang, CP
    McKinley, PK
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 82 - 88
  • [36] Topology-Aware Dynamic Computation Offloading in Vehicular Networks
    Liu, Zhang
    Gau, Zhibin
    LiWang, Minghui
    Chen, Fangzhe
    Wang, Yilin
    Huang, Lianfen
    Tang, Yuliang
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [37] Network Topology-aware Mitigation of Undetectable PMU Time Synchronization Attacks
    Shereen E.
    Dan G.
    IEEE Transactions on Control of Network Systems, 2024, 11 (04): : 1 - 12
  • [38] Topology-Aware Virtual Network Embedding to Survive Multiple Node Failures
    Xiao, Ailing
    Wang, Ying
    Meng, Luoming
    Qiu, Xuesong
    Li, Wenjing
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1823 - 1828
  • [39] Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis
    Li, Yuping
    Jang, Jiyong
    Ou, Xinming
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 278 - 298
  • [40] Expediting Distributed DNN Training With Device Topology-Aware Graph Deployment
    Zhang, Shiwei
    Yi, Xiaodong
    Diao, Lansong
    Wu, Chuan
    Wang, Siyu
    Lin, Wei
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (04) : 1281 - 1293