Skip to main content

Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12938))

  • 1421 Accesses

Abstract

Effective attack schemes that simulate adversarial attack behavior in graph network is the key to exploring potential threats in practical scenarios. However, most attack schemes are not accurate in locating target nodes and lock unnoticeable perturbations from the perspective of graph embedding space, leading to a low success rate of attack and high perturbation on node classification tasks. To overcome these problems, we propose a greedy-based black-box adversarial attack scheme on graph structure, which named GB-Attack. Firstly, we use local betweenness centrality to accurately locate target node set to modify graph structure data with high importance. Secondly, we combine the similarity of graph in latent space and theorems in graph theory to obtain adversarial samples with low perturbation. Finally, we apply greedy strategy to get adversarial samples with higher score function to maximize the probability of target nodes being misclassified. Experimental results show that the attack accuracy of GB-Attack on GCN models is significantly improved compared with other four attack schemes. Notably, the attack accuracy under multilateral perturbations of GB-Attack is 9.73% higher than that of RL-S2V.

Supported by the National Natural Science Foundation of China (NSFC) under Grant No. 61872205, the Shandong Provincial Natural Science Foundation under Grant No. ZR2019MF018, and the Source Innovation Program of Qingdao under Grant No. 18-2-2-56-jch.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yao, L., Mao, C., Luo, Y.: Graph convolutional networks for text classification. In: 33rd AAAI Conference on Artificial Intelligence, Honolulu, pp. 7370–7377. AAAI (2019)

    Google Scholar 

  2. Li, J., Rong, Y., Cheng, H., Meng, H., Huang, W., Huang, J.: Semi-supervised graph classification: a hierarchical graph perspective. In: Proceedings of the World Wide Web, San Francisco, pp. 972–982. ACM (2019)

    Google Scholar 

  3. Cai, H., Zheng, V., Chang, K.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616–1637 (2018)

    Article  Google Scholar 

  4. Zügner, D., Akbarnejad, A., Günnemann, S.: Adversarial attacks on neural networks for graph data. In: 24th International Conference on Knowledge Discovery and Data Mining, London, pp. 2847–2856. ACM (2018)

    Google Scholar 

  5. Cai, Z., Xiong, Z., Xu, H., Wang, P., Li, W., Pan, Y.: Generative adversarial networks: a survey towards private and secure applications. ACM Comput. Surv. 37(4), 1–37 (2020)

    Google Scholar 

  6. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2018)

    Google Scholar 

  7. Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968–979 (2020)

    Article  Google Scholar 

  8. Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 39th IEEE International Conference on Distributed Computing Systems, Dallas, pp. 144–153. IEEE (2019)

    Google Scholar 

  9. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766–775 (2020)

    Article  MathSciNet  Google Scholar 

  10. Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L.: Adversarial examples for graph data: deep insights into attack and defense. In: 28th International Joint Conference on Artificial Intelligence, Macao, pp. 4816–4823. IJCAI (2019)

    Google Scholar 

  11. Chang, H., et al.: A restricted black-box adversarial framework towards attacking graph embedding models. In: 34th AAAI Conference on Artificial Intelligence, New York, pp. 3389–3396. AAAI (2020)

    Google Scholar 

  12. Dai, H., et al.: Adversarial attack on graph structured data. In: 35th International Conference on Machine Learning, Stockholm, pp. 1115–1124. IMLS (2018)

    Google Scholar 

  13. Ma, Y., Wang, S., Wu, L., Tang, J.: Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750 (2019)

  14. Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: 5th International Conference on Learning Representations, ICLR, Toulon (2017)

    Google Scholar 

  15. Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: 20th International Conference on Knowledge Discovery and Data Mining, New York, pp. 701–710. ACM (2014)

    Google Scholar 

  16. Waniek, M., Michalak, T., Wooldridge, M., Rahwan, T.: Hiding individuals and communities in a social network. Nat. Hum. Behav. 2(2), 139–147 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Xia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shao, S., Xia, H., Zhang, R., Cheng, X. (2021). Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86130-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86129-2

  • Online ISBN: 978-3-030-86130-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics