Graph neural network (GNN) with a powerful representation capability has been widely applied to various areas, such as biological gene prediction, social recommendation, etc. Recent works have exposed that GNN is vulnerable to the backdoor attack, i.e., models trained with maliciously crafted training samples are easily fooled by patched samples. Most of the proposed studies launch the backdoor attack using a trigger that either is the randomly generated subgraph (e.g., erd\H{o}s-r\'enyi backdoor) for less computational burden, or the gradient-based generative subgraph (e.g., graph trojaning attack) to enable a more effective attack. However, the interpretation of how is the trigger structure and the effect of the backdoor attack related has been overlooked in the current literature. Motifs, recurrent and statistically significant sub-graphs in graphs, contain rich structure information. In this paper, we are rethinking the trigger from the perspective of motifs, and propose a motif-based backdoor attack, denoted as Motif-Backdoor. It contributes from three aspects. (i) Interpretation: it provides an in-depth explanation for backdoor effectiveness by the validity of the trigger structure from motifs, leading to some novel insights, e.g., using subgraphs that appear less frequently in the graph as the trigger can achieve better attack performance. (ii) Effectiveness: Motif-Backdoor reaches the state-of-the-art (SOTA) attack performance in both black-box and defensive scenarios. (iii) Efficiency: based on the graph motif distribution, Motif-Backdoor can quickly obtain an effective trigger structure without target model feedback or subgraph model generation. Extensive experimental results show that Motif-Backdoor realizes the SOTA performance on three popular models and four public datasets compared with five baselines.
翻译:具有强大代表性能力的图形神经网络(GNN)被广泛应用于不同领域,例如生物基因预测、社会建议等。最近的工作显示,GNN容易受到幕后攻击,即经过恶意制作的培训样本模型很容易被修补的样本蒙骗。大多数拟议研究使用随机生成的子图(例如,erd\H{o}s-r\'enyi后门)触发的后门攻击,用于降低计算效率,或基于梯度的基因子集(例如,图式阵列攻击),以便能够进行更有效的攻击。然而,对触发结构和幕后攻击影响的解释在当前文献中被忽略了。 Motif、经常和具有重要统计意义的子图中包含丰富的结构信息。在本文中,我们正从读到软盘的模型,以及基于底部的底部攻击(例如,图式阵列的突变现) 直径直的基底线子子子集线子集(在Ottal-rif-horal rodeal-deal-deal-deal-deal-deal laftal laftal laftal laft laft laft laft stal stal stal stration) 结构,它提供三个的性能显示。它显示,它显示的性能显示的性能显示。(通过O形结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构结构,可以显示,可以显示,可以显示,可以显示,可以显示)。