Graph Structure Learning for Robust Graph Neural Networks

被引:440
作者
Jin, Wei [1 ]
Ma, Yao [1 ]
Liu, Xiaorui [1 ]
Tang, Xianfeng [2 ]
Wang, Suhang [2 ]
Tang, Jiliang [1 ]
机构
[1] Michigan State Univ, E Lansing, MI 48824 USA
[2] Penn State Univ, University Pk, PA 16802 USA
来源
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING | 2020年
基金
美国国家科学基金会;
关键词
D O I
10.1145/3394486.3403049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph Neural Networks (GNNs) are powerful tools in representation learning for graphs. However, recent studies show that GNNs are vulnerable to carefully-crafted perturbations, called adversarial attacks. Adversarial attacks can easily fool GNNs in making predictions for downstream tasks. The vulnerability to adversarial attacks has raised increasing concerns for applying GNNs in safety-critical applications. Therefore, developing robust algorithms to defend adversarial attacks is of great significance. A natural idea to defend adversarial attacks is to clean the perturbed graph. It is evident that real-world graphs share some intrinsic properties. For example, many real-world graphs are low-rank and sparse, and the features of two adjacent nodes tend to be similar. In fact, we find that adversarial attacks are likely to violate these graph properties. Therefore, in this paper, we explore these properties to defend adversarial attacks on graphs. In particular, we propose a general framework Pro-GNN, which can jointly learn a structural graph and a robust graph neural network model from the perturbed graph guided by these properties. Extensive experiments on real-world graphs demonstrate that the proposed framework achieves significantly better performance compared with the state-of-the-art defense methods, even when the graph is heavily perturbed. We release the implementation of Pro-GNN to our DeepRobust repository for adversarial attacks and defenses(1).
引用
收藏
页码:66 / 74
页数:9
相关论文
共 41 条
[1]  
Ando R. K., 2007, ADV NEURAL INFORM PR, P25
[2]  
[Anonymous], 2019, ARXIV190807558
[3]  
Atwood J, 2016, ADV NEUR IN, V29
[4]  
Battaglia Peter W, 2018, Relational inductive biases, deep learning, and graph networks, DOI DOI 10.48550/ARXIV.1806.01261
[5]   A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems [J].
Beck, Amir ;
Teboulle, Marc .
SIAM JOURNAL ON IMAGING SCIENCES, 2009, 2 (01) :183-202
[6]  
Bojchevski Aleksandar, 2019, ICML
[7]  
Bruna J., 2014, P 2 INT C LEARN REPR
[8]   Exact Matrix Completion via Convex Optimization [J].
Candes, Emmanuel J. ;
Recht, Benjamin .
FOUNDATIONS OF COMPUTATIONAL MATHEMATICS, 2009, 9 (06) :717-772
[9]   How Do the Open Source Communities Address Usability and UX Issues? An Exploratory Study [J].
Cheng, Jinghui ;
Guo, Jin L. C. .
CHI 2018: EXTENDED ABSTRACTS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2018,
[10]   Proximal Splitting Methods in Signal Processing [J].
Combettes, Patrick L. ;
Pesquet, Jean-Christophe .
FIXED-POINT ALGORITHMS FOR INVERSE PROBLEMS IN SCIENCE AND ENGINEERING, 2011, 49 :185-+