While deep neural networks have achieved great success on the graph analysis, recent works have shown that they are also vulnerable to adversarial attacks where fraudulent users can fool the model with a limited number of queries. Compared with adversarial attacks on image classification, performing adversarial attack on graphs is challenging because of the discrete and non-differential nature of a graph. To address these issues, we proposed Cluster Attack, a novel adversarial attack by introducing a set of fake nodes to the original graph which can mislead the classification on certain victim nodes. Specifically, we query the victim model for each victim node to acquire their most adversarial feature, which is related to how the fake node's feature will affect the victim nodes. We further cluster the victim nodes into several subgroups according to their most adversarial features such that we can reduce the searching space. Moreover, our attack is performed in a practical and unnoticeable manner: (1) We protect the predicted labels of nodes which we are not aimed for from being changed during attack. (2) We attack by introducing fake nodes into the original graph without changing existing links and features. (3) We attack with only partial information about the attacked graph, i.e., by leveraging the information of victim nodes along with their neighbors within $k$-hop instead of the whole graph. (4) We perform attack with a limited number of queries about the predicted scores of the model in a black-box manner, i.e., without model architecture and parameters. Extensive experiments demonstrate the effectiveness of our method in terms of the success rate of attack.
翻译:虽然深心神经网络在图形分析上取得了巨大成功,但最近的著作表明,它们也容易受到对抗性攻击的伤害,因为欺诈性用户可以以数量有限的查询来欺骗模型。与图像分类的对抗性攻击相比,在图表上进行对抗性攻击具有挑战性,因为图表具有离散和无差别的性质。为了解决这些问题,我们提议了集束攻击,这是一种新型的对抗性攻击,在原始图表中引入了一套假节点,可以误导某些受害者节点的分类。具体地说,我们询问每个受害者节点的受害者模式,以获得其最激烈的对抗性特征,这与假节点特征如何影响受害者节点有关。我们进一步将受害者节点集中到几个分组,因为其最激烈的对抗性特征是我们可以减少搜索空间。此外,我们的攻击是以实用和不可注意的方式进行的:(1) 我们保护我们并非针对的节点模型的预测性标签在攻击中被改变。(2) 我们通过在原始图表中引入假节点,而不改变现有的链接和特征。(3) 我们攻击性节点的参数只是部分信息,而不是攻击性图表。