Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration
Abstract
References
Index Terms
- Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration
Recommendations
A Dual Robust Graph Neural Network Against Graph Adversarial Attacks
AbstractGraph Neural Networks (GNNs) have gained widespread usage and achieved remarkable success in various real-world applications. Nevertheless, recent studies reveal the vulnerability of GNNs to graph adversarial attacks that fool them by modifying ...
Machine Learning Integrity and Privacy in Adversarial Environments
SACMAT '21: Proceedings of the 26th ACM Symposium on Access Control Models and TechnologiesMachine learning is increasingly being used for automated decisions in applications such as health care, finance, autonomous vehicles, and personalized recommendations. These critical applications require strong guarantees on both the integrity of the ...
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks
Recent studies indicate that Graph Neural Networks (GNNs) are vulnerable to adversarial attacks. Particularly, adversarially perturbing the graph structure, e.g., flipping edges, can lead to salient degeneration of GNNs’ accuracy. In general, efficiency ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/e90b76c8-3c0c-408a-b595-29f1a97e7999/3576915.cover.jpg)
- General Chairs:
- Weizhi Meng,
- Christian D. Jensen,
- Program Chairs:
- Cas Cremers,
- Engin Kirda
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 765Total Downloads
- Downloads (Last 12 months)466
- Downloads (Last 6 weeks)22
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in