Maximizing Malicious Influence in Node Injection Attack

No Thumbnail Available
File version
Author(s)
Zhang, Xiao
Bao, Peng
Pan, Shirui
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2024
Size
File type(s)
Location

Merida, Mexico

License
Abstract

Graph neural networks (GNNs) have achieved impressive performance in various graph-related tasks. However, recent studies have found that GNNs are vulnerable to adversarial attacks. Node injection attacks (NIA) become an emerging scenario of graph adversarial attacks, where the attacks are performed by injecting malicious nodes into the original graph instead of directly modifying it. In this paper, we focus on a more realistic scenario of NIA, where the attacker is only allowed to inject a small number of nodes to degrade the performance of GNNs with very limited information. We analyze the susceptibility of nodes, and based on this we propose a global node injection attack framework, MaxiMal, to maximize malicious information under a strict black-box setting. MaxiMal first introduces a susceptible-reverse influence sampling strategy to select neighbor nodes that are able to spread malicious information widely. Then contrastive loss is introduced to optimize the objective by updating the edges and features of the injected nodes. Extensive experiments on three benchmark datasets demonstrate the superiority of our proposed MaxiMal over the state-of-the-art approaches.

Journal Title
Conference Title

WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data Mining

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject

Nanotechnology

Neural networks

Data security and protection

Data mining and knowledge discovery

Persistent link to this record
Citation

Zhang, X; Bao, P; Pan, S, Maximizing Malicious Influence in Node Injection Attack, Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024, pp. 958-966