Adversarial attacks and defenses on graphs

W Jin, Y Li, H Xu, Y Wang, S Ji, C Aggarwal… - ACM SIGKDD …, 2021 - dl.acm.org
Adversarial Attacks and Defenses on Graphs Page 1 Adversarial Attacks and Defenses on
Graphs: A Review, A Tool and Empirical Studies Wei Jin†, Yaxin Li†, Han Xu†, Yiqi Wang† …

Admix: Enhancing the transferability of adversarial attacks

X Wang, X He, J Wang, K He - Proceedings of the IEEE/CVF …, 2021 - openaccess.thecvf.com
Deep neural networks are known to be extremely vulnerable to adversarial examples under
white-box setting. Moreover, the malicious adversaries crafted on the surrogate (source) …

Node similarity preserving graph convolutional networks

W Jin, T Derr, Y Wang, Y Ma, Z Liu, J Tang - Proceedings of the 14th …, 2021 - dl.acm.org
Graph Neural Networks (GNNs) have achieved tremendous success in various real-world
applications due to their strong ability in graph representation learning. GNNs explore the …

Skip connections matter: On the transferability of adversarial examples generated with resnets

D Wu, Y Wang, ST Xia, J Bailey, X Ma - arXiv preprint arXiv:2002.05990, 2020 - arxiv.org
Skip connections are an essential component of current state-of-the-art deep neural
networks (DNNs) such as ResNet, WideResNet, DenseNet, and ResNeXt. Despite their …

Structure invariant transformation for better adversarial transferability

X Wang, Z Zhang, J Zhang - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial
examples, there is an urgent need for an effective adversarial attack to identify the …

Universal adversarial examples in remote sensing: Methodology and benchmark

Y Xu, P Ghamisi - IEEE Transactions on Geoscience and …, 2022 - ieeexplore.ieee.org
Deep neural networks have achieved great success in many important remote sensing
tasks. Nevertheless, their vulnerability to adversarial examples should not be neglected. In …

On success and simplicity: A second look at transferable targeted attacks

Z Zhao, Z Liu, M Larson - Advances in Neural Information …, 2021 - proceedings.neurips.cc
Achieving transferability of targeted attacks is reputed to be remarkably difficult. The current
state of the art has resorted to resource-intensive solutions that necessitate training model …

Transferring robustness for graph neural network against poisoning attacks

X Tang, Y Li, Y Sun, H Yao, P Mitra… - Proceedings of the 13th …, 2020 - dl.acm.org
Graph neural networks (GNNs) are widely used in many applications. However, their
robustness against adversarial attacks is criticized. Prior studies show that using …

Boosting the transferability of adversarial attacks with reverse adversarial perturbation

Z Qin, Y Fan, Y Liu, L Shen, Y Zhang… - Advances in neural …, 2022 - proceedings.neurips.cc
Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples,
which can produce erroneous predictions by injecting imperceptible perturbations. In this …

Efficient adversarial training with transferable adversarial examples

H Zheng, Z Zhang, J Gu, H Lee… - Proceedings of the …, 2020 - openaccess.thecvf.com
Adversarial training is an effective defense method to protect classification models against
adversarial attacks. However, one limitation of this approach is that it can require orders of …