Adversarial Examples for Graph Data: Deep Insights into Attack and Defense

被引:0
|
作者
Wu, Huijun [1 ,2 ]
Wang, Chen [2 ]
Tyshetskiy, Yuriy [2 ]
Docherty, Andrew [2 ]
Lu, Kai [3 ]
Zhu, Liming [1 ,2 ]
机构
[1] Univ New South Wales, Sydney, NSW, Australia
[2] CSIRO, Data61, Canberra, ACT, Australia
[3] Natl Univ Def Technol, Changsha, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph deep learning models, such as graph convolutional networks (GCN) achieve state-of-the-art performance for tasks on graph data. However, similar to other deep learning models, graph deep learning models are susceptible to adversarial attacks. However, compared with non-graph data the discrete nature of the graph connections and features provide unique challenges and opportunities for adversarial attacks and defenses. In this paper, we propose techniques for both an adversarial attack and a defense against adversarial attacks. Firstly, we show that the problem of discrete graph connections and the discrete features of common datasets can be handled by using the integrated gradient technique that accurately determines the effect of changing selected features or edges while still benefiting from parallel computations. In addition, we show that an adversarially manipulated graph using a targeted attack statistically differs from un-manipulated graphs. Based on this observation, we propose a defense approach which can detect and recover a potential adversarial perturbation. Our experiments on a number of datasets show the effectiveness of the proposed techniques.
引用
收藏
页码:4816 / 4823
页数:8
相关论文
共 50 条
  • [31] Complete Defense Framework to Protect Deep Neural Networks against Adversarial Examples
    Sun, Guangling
    Su, Yuying
    Qin, Chuan
    Xu, Wenbo
    Lu, Xiaofeng
    Ceglowski, Andrzej
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [32] DeepMTD: Moving Target Defense for Deep Visual Sensing against Adversarial Examples
    Song, Qun
    Yan, Zhenyu
    Tan, Rui
    ACM Transactions on Sensor Networks, 2021, 18 (01)
  • [33] Dealing with the unevenness: deeper insights in graph-based attack and defense
    Haoxi Zhan
    Xiaobing Pei
    Machine Learning, 2024, 113 : 2921 - 2953
  • [34] Dealing with the unevenness: deeper insights in graph-based attack and defense
    Zhan, Haoxi
    Pei, Xiaobing
    MACHINE LEARNING, 2024, 113 (05) : 2921 - 2953
  • [35] Attack and Defense: Adversarial Security of Data-Driven FDC Systems
    Zhuo, Yue
    Yin, Zhenqin
    Ge, Zhiqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 5 - 19
  • [36] Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies
    Shi, Yi
    Sagduyu, Yalin E.
    Erpek, Tugba
    Davaslioglu, Kemal
    Lu, Zhuo
    Li, Jason H.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [37] MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation
    Guo, Sensen
    Li, Xiaoyu
    Zhu, Peican
    Wang, Baocang
    Mu, Zhiying
    Zhao, Jinxiong
    INFORMATION SCIENCES, 2024, 657
  • [38] LOGICDEF: An Interpretable Defense Framework against Adversarial Examples via Inductive Scene Graph Reasoning
    Yang, Yuan
    Kerce, James C.
    Fekri, Faramarz
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 8840 - 8848
  • [39] Adversarial Attack on Large Scale Graph
    Li, Jintang
    Xie, Tao
    Chen, Liang
    Xie, Fenfang
    He, Xiangnan
    Zheng, Zibin
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (01) : 82 - 95
  • [40] Graph Adversarial Attack via Rewiring
    Ma, Yao
    Wang, Suhang
    Derr, Tyler
    Wu, Lingfei
    Tang, Jiliang
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1161 - 1169