Adversarial attack on graph neural networks as an influence maximization problem

Jiaqi Ma, Junwei Deng, Qiaozhu Mei

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Graph neural networks (GNNs) have attracted increasing interests. With broad deployments of GNNs in real-world applications, there is an urgent need for understanding the robustness of GNNs under adversarial attacks, especially in realistic setups. In this work, we study the problem of attacking GNNs in a restricted and realistic setup, by perturbing the features of a small set of nodes, with no access to model parameters and model predictions. Our formal analysis draws a connection between this type of attacks and an influence maximization problem on the graph. This connection not only enhances our understanding on the problem of adversarial attack on GNNs, but also allows us to propose a group of effective and practical attack strategies. Our experiments verify that the proposed attack strategies significantly degrade the performance of three popular GNN models and outperform baseline adversarial attack strategies.

Original languageEnglish (US)
Title of host publicationWSDM 2022 - Proceedings of the 15th ACM International Conference on Web Search and Data Mining
PublisherAssociation for Computing Machinery
Pages675-685
Number of pages11
ISBN (Electronic)9781450391320
DOIs
StatePublished - Feb 11 2022
Externally publishedYes
Event15th ACM International Conference on Web Search and Data Mining, WSDM 2022 - Virtual, Online, United States
Duration: Feb 21 2022Feb 25 2022

Publication series

NameWSDM 2022 - Proceedings of the 15th ACM International Conference on Web Search and Data Mining

Conference

Conference15th ACM International Conference on Web Search and Data Mining, WSDM 2022
Country/TerritoryUnited States
CityVirtual, Online
Period2/21/222/25/22

Keywords

  • Adversarial attack
  • Graph neural networks
  • Influence maximization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Adversarial attack on graph neural networks as an influence maximization problem'. Together they form a unique fingerprint.

Cite this