Adversarial attacks on Graph Neural Networks (GNNs) reveal their security vulnerabilities, limiting their adoption in safety-critical applications. However, existing attack strategies rely on the knowledge of either the GNN model being used or the predictive task being attacked. Is this knowledge necessary? For example, a graph may be used for multiple downstream tasks unknown to a practical attacker. It is thus important to test the vulnerability of GNNs to adversarial perturbations in a model and task-agnostic setting. In this work, we study this problem and show that Gnns remain vulnerable even when the downstream task and model are unknown. The proposed algorithm, TANDIS (Targeted Attack via Neighborhood DIStortion) shows that distortio...
Graph Neural Networks (GNNs), a generalization of neural networks to graph-structured data, are ofte...
Graph neural networks (GNNs) have enabled the automation of many web applications that entail node c...
A cursory reading of the literature suggests that we have made a lot of progress in designing effect...
Adversarial attacks on Graph Neural Networks (GNNs) reveal their security vulnerabilities, limiting ...
Recent years have witnessed the deployment of adversarial attacks to evaluate the robustness of Neur...
Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting...
Deep neural networks (DNNs) have been widely applied to various applications including image classif...
Graph data has been widely used to represent data from various domain, e.g., social networks, recomm...
Graph Neural Networks (GNNs) have emerged as a series of effective learning methods for graph-relate...
Graph neural networks (GNNs) have achieved tremendous success in the task of graph classification an...
Graph neural networks (GNNs) have achieved state-of-the-art performance in many graph-based tasks su...
International audienceMany real-world data come in the form of graphs. Graph neural networks (GNNs),...
Backdoor attacks represent a serious threat to neural network models. A backdoored model will miscla...
With the rapid development of neural network technologies in machine learning, neural networks are w...
Graph neural networks (GNNs) offer promising learning methods for graph-related tasks. However, GNNs...
Graph Neural Networks (GNNs), a generalization of neural networks to graph-structured data, are ofte...
Graph neural networks (GNNs) have enabled the automation of many web applications that entail node c...
A cursory reading of the literature suggests that we have made a lot of progress in designing effect...
Adversarial attacks on Graph Neural Networks (GNNs) reveal their security vulnerabilities, limiting ...
Recent years have witnessed the deployment of adversarial attacks to evaluate the robustness of Neur...
Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting...
Deep neural networks (DNNs) have been widely applied to various applications including image classif...
Graph data has been widely used to represent data from various domain, e.g., social networks, recomm...
Graph Neural Networks (GNNs) have emerged as a series of effective learning methods for graph-relate...
Graph neural networks (GNNs) have achieved tremendous success in the task of graph classification an...
Graph neural networks (GNNs) have achieved state-of-the-art performance in many graph-based tasks su...
International audienceMany real-world data come in the form of graphs. Graph neural networks (GNNs),...
Backdoor attacks represent a serious threat to neural network models. A backdoored model will miscla...
With the rapid development of neural network technologies in machine learning, neural networks are w...
Graph neural networks (GNNs) offer promising learning methods for graph-related tasks. However, GNNs...
Graph Neural Networks (GNNs), a generalization of neural networks to graph-structured data, are ofte...
Graph neural networks (GNNs) have enabled the automation of many web applications that entail node c...
A cursory reading of the literature suggests that we have made a lot of progress in designing effect...