Skip to main content

Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function

Publication ,  Conference
Wang, B; Lin, M; Zhou, T; Zhou, P; Li, A; Pang, M; Li, H; Chen, Y
Published in: WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining
March 4, 2024

Graph neural network (GNN), the mainstream method to learn on graph data, is vulnerable to graph evasion attacks, where an attacker slightly perturbing the graph structure can fool trained GNN models. Existing work has at least one of the following drawbacks: 1) limited to directly attack two-layer GNNs; 2) inefficient; and 3) impractical, as they need to know full or part of GNN model parameters. We address the above drawbacks and propose an influence-based efficient, direct, and restricted black-box evasion attack to any-layer GNNs. Specifically, we first introduce two influence functions, i.e., feature-label influence and label influence, that are defined on GNNs and label propagation (LP), respectively. Then we observe that GNNs and LP are strongly connected in terms of our defined influences. Based on this, we can then reformulate the evasion attack to GNNs as calculating label influence on LP, which is inherently applicable to any-layer GNNs, while no need to know information about the internal GNN model. Finally, we propose an efficient algorithm to calculate label influence. Experimental results on various graph datasets show that, compared to state-of-The-Art white-box attacks, our attack can achieve comparable attack performance, but has a 5-50x speedup when attacking two-layer GNNs. Moreover, our attack is effective to attack multi-layer GNNs.

Duke Scholars

Published In

WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining

DOI

Publication Date

March 4, 2024

Start / End Page

693 / 701
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, B., Lin, M., Zhou, T., Zhou, P., Li, A., Pang, M., … Chen, Y. (2024). Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function. In WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining (pp. 693–701). https://doi.org/10.1145/3616855.3635826
Wang, B., M. Lin, T. Zhou, P. Zhou, A. Li, M. Pang, H. Li, and Y. Chen. “Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function.” In WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 693–701, 2024. https://doi.org/10.1145/3616855.3635826.
Wang B, Lin M, Zhou T, Zhou P, Li A, Pang M, et al. Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function. In: WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining. 2024. p. 693–701.
Wang, B., et al. “Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function.” WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024, pp. 693–701. Scopus, doi:10.1145/3616855.3635826.
Wang B, Lin M, Zhou T, Zhou P, Li A, Pang M, Li H, Chen Y. Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function. WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining. 2024. p. 693–701.

Published In

WSDM 2024 - Proceedings of the 17th ACM International Conference on Web Search and Data Mining

DOI

Publication Date

March 4, 2024

Start / End Page

693 / 701