Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
Black-box adversarial attacks have demonstrated strong potential to compromise machine
learning models by iteratively querying the target model or leveraging transferability from a …
learning models by iteratively querying the target model or leveraging transferability from a …
Temporal dynamics-aware adversarial attacks on discrete-time dynamic graph models
Real-world graphs such as social networks, communication networks, and rating networks
are constantly evolving over time. Many deep learning architectures have been developed …
are constantly evolving over time. Many deep learning architectures have been developed …
ERGCN: Data enhancement-based robust graph convolutional network against adversarial attacks
With recent advancements, graph neural networks (GNNs) have shown considerable
potential for various graph-related tasks, and their applications have gained considerable …
potential for various graph-related tasks, and their applications have gained considerable …
Efficient, direct, and restricted black-box graph evasion attacks to any-layer graph neural networks via influence function
Graph neural network (GNN), the mainstream method to learn on graph data, is vulnerable
to graph evasion attacks, where an attacker slightly perturbing the graph structure can fool …
to graph evasion attacks, where an attacker slightly perturbing the graph structure can fool …
A targeted universal attack on graph convolutional network by using fake nodes
J Dai, W Zhu, X Luo - Neural Processing Letters, 2022 - Springer
Graph-structured data exist in numerous applications in real life. As a state-of-the-art graph
neural network, the graph convolutional network (GCN) plays an important role in …
neural network, the graph convolutional network (GCN) plays an important role in …
Black-box attacks on dynamic graphs via adversarial topology perturbations
Research and analysis of attacks on dynamic graph is beneficial for information systems to
investigate vulnerabilities and strength abilities in resisting malicious attacks. Existing …
investigate vulnerabilities and strength abilities in resisting malicious attacks. Existing …
Adversarial Attack and Defense on Discrete Time Dynamic Graphs
Graph learning methods have achieved remarkable performance in various domains such
as social recommendation, financial fraud detection, and so on. In real applications, the …
as social recommendation, financial fraud detection, and so on. In real applications, the …
A Black-box Adversarial Attack Method via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural Networks
S Zhao, W Wang, Z Du, J Chen… - IEEE Transactions on Big …, 2023 - ieeexplore.ieee.org
Recent studies have shown that Graph Neural Networks (GNNs) are vulnerable to well-
designed and imperceptible adversarial attack. Attacks utilizing gradient information are …
designed and imperceptible adversarial attack. Attacks utilizing gradient information are …
[HTML][HTML] Adversarial attacks against dynamic graph neural networks via node injection
Y Jiang, H **a - High-Confidence Computing, 2024 - Elsevier
Dynamic graph neural networks (DGNNs) have demonstrated their extraordinary value in
many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden …
many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden …
Imperceptible adversarial attacks on discrete-time dynamic graph models
Real-world graphs such as social networks, communication networks, and rating networks
are constantly evolving over time. Many architectures have been de, veloped to learn …
are constantly evolving over time. Many architectures have been de, veloped to learn …