Y Chen, Z Ye, H Zhao, Y Wang - International Journal of …, 2023 - Wiley Online Library
Graph neural networks (GNNs) have shown significant performance in various practical applications due to their strong learning capabilities. Backdoor attacks are a type of attack …
Graph neural networks (GNNs) have emerged as a powerful model to capture critical graph patterns. Instead of treating them as black boxes in an end-to-end fashion, attempts are …
Y Chen, Z Ye, Z Wang, H Zhao - Complex & Intelligent Systems, 2024 - Springer
Abstract In recent years, Graph Neural Networks (GNNs) have achieved excellent applications in classification or prediction tasks. Recent studies have demonstrated that …
J Shao, Y Wang, F Guo, B Shi, H Shen… - Proceedings of the 32nd …, 2023 - dl.acm.org
Privacy concerns on social networks have received extensive attention in recent years. The task of user identity linkage (UIL), which aims to identify corresponding users across different …
We study deceptive fairness attacks on graphs to answer the following question: How can we achieve poisoning attacks on a graph learning model to exacerbate the bias …
Graph augmentation has received great attention in recent years for graph contrastive learning (GCL) to learn well-generalized node/graph representations. However, mainstream …
Y Nian, W Jin, L Lin - arXiv preprint arXiv:2306.10447, 2023 - arxiv.org
Graphs neural networks (GNNs) have emerged as a powerful graph learning model due to their superior capacity in capturing critical graph patterns. To gain insights about the model …
This paper introduces adversarial attacks targeting a Graph Neural Network (GNN)-based radio resource management system in point-to-point (P2P) communications. Our focus lies …
S Zhao, W Wang, Z Du, J Chen… - IEEE Transactions on Big …, 2023 - ieeexplore.ieee.org
Recent studies have shown that Graph Neural Networks (GNNs) are vulnerable to well- designed and imperceptible adversarial attack. Attacks utilizing gradient information are …