Robust graph embedding via Attack-aid Graph Denoising

被引:0
作者
Qin, Zhili [1 ]
Wang, Han [1 ]
Yu, Zhongjing [3 ]
Yang, Qinli [1 ]
Shao, Junming [2 ,4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Data Min Lab, Chengdu, Peoples R China
[2] Univ Elect Sci & Technol China, Yangtze Delta Reg Inst Quzhou, Quzhou, Peoples R China
[3] Peking Univ, State Key Lab Turbulence & Complex Syst, Beijing, Peoples R China
[4] Univ Elect Sci & Technol China, Shenzhen Inst Adv Study, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Graph embedding; Graph denoising; Graph neural networks; Robustness; Adversarial attack;
D O I
10.1016/j.ins.2024.120942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The quality of graphs directly affects the result of graph embedding since most existing models are vulnerable and highly sensitive to harmful/missing edges and imperceptible attacks. In this study, we propose a new robust graph embedding approach from a different point of view: Attack-aid Graph Denoising (AGD). AGD mitigates the impact of harmful and missing edges by leveraging adversarial attacks. Initially, AGD generates some auxiliary attacks on the topology by investigating their harm to classification accuracy. Subsequently, we derive a denoised adjacency matrix by removing these similar harmful edges and supplementing missing edges with flipping operations. Finally, we further extract the knowledge of topology to eliminate the influence of remaining harmful edges on the final embedding with Kullback-Leibler divergence. Extensive experiments have demonstrated that AGD not only shows its superiority over many state-of-theart algorithms on the classification tasks but is also robust to various attacks.
引用
收藏
页数:15
相关论文
共 35 条
[1]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[2]   Semantic-Interactive Graph Convolutional Network for Multilabel Image Recognition [J].
Chen, Bingzhi ;
Zhang, Zheng ;
Lu, Yao ;
Chen, Fanglin ;
Lu, Guangming ;
Zhang, David .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (08) :4887-4899
[3]  
Chen DL, 2020, AAAI CONF ARTIF INTE, V34, P3438
[4]  
Chen Y., 2020, Advances in Neural Information Processing Systems, V33, P18194
[5]  
Dai HJ, 2018, PR MACH LEARN RES, V80
[6]   MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM [J].
DEMPSTER, AP ;
LAIRD, NM ;
RUBIN, DB .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL, 1977, 39 (01) :1-38
[7]   All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs [J].
Entezari, Negin ;
Al-Sayouri, Saba A. ;
Darvishzadeh, Amirali ;
Papalexakis, Evangelos E. .
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM '20), 2020, :169-177
[8]   Poisoning Attacks to Graph-Based Recommender Systems [J].
Fang, Minghong ;
Yang, Guolei ;
Gong, Neil Zhenqiang ;
Liu, Jia .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :381-392
[9]  
Feng BY, 2021, AAAI CONF ARTIF INTE, V35, P7404
[10]  
Gilmer J, 2017, PR MACH LEARN RES, V70