Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and node features. Many adversarial attacks have been proposed to disclose the fragility of GNNs under different perturbation strategies to create adversarial examples. However, vulnerability of GNNs to successful backdoor attacks was only shown recently. In this paper, we disclose the TRAP attack, a Transferable GRAPh backdoor attack. The core attack principle is to poison the training dataset with perturbation-based triggers that can lead to an effective and transferable backdoor attack. The perturbation trigger for a graph is generated by performing the perturbation actions on the graph structure via a gradient based score matrix from a surrogate model. Compared with prior works, TRAP attack is different in several ways: i) it exploits a surrogate Graph Convolutional Network (GCN) model to generate perturbation triggers for a blackbox based backdoor attack; ii) it generates sample-specific perturbation triggers which do not have a fixed pattern; and iii) the attack transfers, for the first time in the context of GNNs, to different GNN models when trained with the forged poisoned training dataset. Through extensive evaluations on four real-world datasets, we demonstrate the effectiveness of the TRAP attack to build transferable backdoors in four different popular GNNs using four real-world datasets.
翻译:图形神经网络(GNNs) 在许多图形采矿任务中取得了巨大成功, 信息传递策略将本地结构和节点功能结合在一起, 以更好地图形演示学习。 尽管GNNs的成功, 与其他类型的深神经网络相似, GNNs 被发现容易在图形结构和节点特性上受到无法察觉的干扰。 许多对抗性攻击被提议通过不同扰动战略披露GNS的脆弱性, 以创建对抗性实例。 然而, GNS 易被成功后门攻击的策略最近才显示。 在本文中,我们披露了TRAP 的系统性攻击, 一个可转移的 GRAPh 数据后门攻击。 核心攻击原则是毒害培训数据集, 其基于透视和可转移的后门攻击。 图形的触动触发因素是, 以基于调频谱的分数矩阵模型为基础在图形结构上进行扰动动作, 与之前的工作相比, TRAP 攻击在几个方面不同: i) 它利用一个可转移的轨道数据传输的 GRAP TRAP 后门模型, 在固定的 Grevb 触发 G trig 服务器 网络在四个 中生成的 Grevbbreal 中生成的 Grevbrebrebreal 。