ERGCN: Data enhancement-based robust graph convolutional network against adversarial attacks

被引:16
作者
Wu, Tao [1 ]
Yang, Nan [2 ]
Chen, Long [1 ]
Xiao, Xiaokui [3 ]
Xian, Xingping [1 ]
Liu, Jun [4 ]
Qiao, Shaojie [5 ]
Cui, Canyixing [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cybersecur & Informat Law, Chongqing, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing, Peoples R China
[3] Natl Univ Singapore NUS, Sch Comp SoC, Singapore, Singapore
[4] Chongqing Univ Posts & Telecommun, Sch Software Engn, Chongqing, Peoples R China
[5] Chengdu Univ Informat Technol, Sch Software Engn, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Graph machine learning; Graph convolutional networks; Adversarial attacks; Node classification; Data enhancement; PREDICTION;
D O I
10.1016/j.ins.2022.10.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With recent advancements, graph neural networks (GNNs) have shown considerable potential for various graph-related tasks, and their applications have gained considerable attention. However, adversarial attacks can significantly degrade the performance of GNNs, hindering their deployment in critical real-world tasks. GNNs must be robust against adversarial attacks, in which imperceptible adversarial perturbations are intro-duced to induce serious security issues. To achieve this goal, we propose a robust graph convolutional network, ERGCN, for node classification via data enhancement. ERGCN simultaneously utilizes properties from the "data domain" and "model space" as guidance. Based on the feature smoothness assumption, a graph structure enhancement (GSE) mech-anism is proposed to improve the structural reliability of input graphs. Moreover, inspired by self-training methods that assign pseudo-labels to unlabeled training samples and use them to optimize the target model iteratively, a reliable node selection metric, model boundary distance (MBD), is defined based on the distance from training samples to model decision boundary. Finally, a self-training-based robust graph convolutional network is proposed for node classification. Extensive experiments on three public datasets demon-strate the superiority of our model over existing state-of-the-art methods. Our study pro-vides a solution for trustworthy graph machine learning systems in adversarial environments. The code is available at https://github.com/star4455/ERGCN.(c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:234 / 253
页数:20
相关论文
共 50 条
  • [21] Adversarial Attack on Community Detection by Hiding Individuals
    Li, Jia
    Zhang, Honglei
    Han, Zhichao
    Rong, Yu
    Cheng, Hong
    Huang, Junzhou
    [J]. WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 917 - 927
  • [22] Smooth Neighbors on Teacher Graphs for Semi-supervised Learning
    Luo, Yucen
    Zhu, Jun
    Li, Mengxi
    Ren, Yong
    Zhang, Bo
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 8896 - 8905
  • [23] Birds of a feather: Homophily in social networks
    McPherson, M
    Smith-Lovin, L
    Cook, JM
    [J]. ANNUAL REVIEW OF SOCIOLOGY, 2001, 27 : 415 - 444
  • [24] DeepFool: a simple and accurate method to fool deep neural networks
    Moosavi-Dezfooli, Seyed-Mohsen
    Fawzi, Alhussein
    Frossard, Pascal
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 2574 - 2582
  • [25] Kipf TN, 2017, Arxiv, DOI arXiv:1609.02907
  • [26] Namata G., 2012, 10 INT WORKSH MIN LE
  • [27] The Limitations of Deep Learning in Adversarial Settings
    Papernot, Nicolas
    McDaniel, Patrick
    Jha, Somesh
    Fredrikson, Matt
    Celik, Z. Berkay
    Swami, Ananthram
    [J]. 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 372 - 387
  • [28] Real-time Constrained Cycle Detection in Large Dynamic Graphs
    Qiu, Xiafei
    Cen, Wubin
    Qian, Zhengping
    Peng, You
    Zhang, Ying
    Lin, Xuemin
    Zhou, Jingren
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2018, 11 (12): : 1876 - 1888
  • [29] Safe Machine Learning and Defeating Adversarial Attacks
    Rouhani, Bita Darvish
    Samragh, Mohammad
    Javidi, Tara
    Koushanfar, Farinaz
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (02) : 31 - 38
  • [30] Collective Classification in Network Data
    Sen, Prithviraj
    Namata, Galileo
    Bilgic, Mustafa
    Getoor, Lise
    Gallagher, Brian
    Eliassi-Rad, Tina
    [J]. AI MAGAZINE, 2008, 29 (03) : 93 - 106