A New Strategy of Graph Structure Attack: Multi-View Perturbation Candidate Edge Learning

被引:2
作者
Cao, Feilong [1 ]
Chen, Qiyang [1 ]
Ye, Hailiang [1 ]
机构
[1] China Jiliang Univ, Coll Sci, Dept Appl Math, Hangzhou 310018, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 05期
基金
中国国家自然科学基金;
关键词
Perturbation methods; Topology; Training; Biological system modeling; Task analysis; Predictive models; Prediction algorithms; Adversarial attack; graph neural networks; graph representation learning; multi-view;
D O I
10.1109/TNSE.2024.3400860
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Adversarial attacks can fool powerful graph neural networks by subtly modifying input data's graph topology or node attributes. Attackers usually regard the whole graph or local subgraphs as an effective attack strategy in the process of disrupting graph structure. However, the former demands more time and memory, while the latter overlooks the benefits of global information. Therefore, this paper proposes a new strategy for graph structure attack, i.e., multi-view perturbation candidate edge learning (GSA-MPCEL), to explore global and local information in graphs. Its core is to design a multi-view perturbation candidate edge learning (MPCEL) module and a guided attack loss (GAL) to direct the attack. Firstly, a candidate subgraph is acquired by building the MPCEL module, involving an adaptive global view, a local view covering neighbor information, and a latent view utilizing labels. These views effectively allocate candidates for topology modifications. Secondly, the novel GAL is developed to boost the likelihood of the target node being misclassified as a specific class, thereby enhancing attack performance. Moreover, the computational complexity of GSA-MPCEL in theory is analyzed. Experiments on real-world datasets with various target models indicate that GSA-MPCEL realizes competitive attack performance at an acceptable time cost among other state-of-the-art attack methods.
引用
收藏
页码:4158 / 4168
页数:11
相关论文
共 46 条
[1]   Some unique properties of eigenvector centrality [J].
Bonacich, Phillip .
SOCIAL NETWORKS, 2007, 29 (04) :555-564
[2]   GraphAttacker: A General Multi-Task Graph Attack Framework [J].
Chen, Jinyin ;
Zhang, Dunjie ;
Ming, Zhaoyan ;
Huang, Kejie ;
Jiang, Wenrong ;
Cui, Chen .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (02) :577-595
[3]   MGA: Momentum Gradient Attack on Network [J].
Chen, Jinyin ;
Chen, Yixian ;
Zheng, Haibin ;
Shen, Shijing ;
Yu, Shanqing ;
Zhang, Dan ;
Xuan, Qi .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (01) :99-109
[4]   Multiscale Evolutionary Perturbation Attack on Community Detection [J].
Chen, Jinyin ;
Chen, Yixian ;
Chen, Lihong ;
Zhao, Minghao ;
Xuan, Qi .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (01) :62-75
[5]   GA-Based Q-Attack on Community Detection [J].
Chen, Jinyin ;
Chen, Lihong ;
Chen, Yixian ;
Zhao, Minghao ;
Yu, Shanqing ;
Xuan, Qi ;
Yang, Xiaoniu .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2019, 6 (03) :491-503
[6]  
Chen L, 2021, PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, P2249
[7]  
Dai HJ, 2018, PR MACH LEARN RES, V80
[8]   PageRank Beyond the Web [J].
Gleich, David F. .
SIAM REVIEW, 2015, 57 (03) :321-363
[9]   Node Similarity Preserving Graph Convolutional Networks [J].
Jin, Wei ;
Derr, Tyler ;
Wang, Yiqi ;
Ma, Yao ;
Liu, Zitao ;
Tang, Jiliang .
WSDM '21: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2021, :148-156
[10]   A Comprehensive Survey on Deep Graph Representation Learning [J].
Ju, Wei ;
Fang, Zheng ;
Gu, Yiyang ;
Liu, Zequn ;
Long, Qingqing ;
Qiao, Ziyue ;
Qin, Yifang ;
Shen, Jianhao ;
Sun, Fang ;
Xiao, Zhiping ;
Yang, Junwei ;
Yuan, Jingyang ;
Zhao, Yusheng ;
Wang, Yifan ;
Luo, Xiao ;
Zhang, Ming .
NEURAL NETWORKS, 2024, 173