As the number of graph-level embedding techniques increases at an unprecedented speed, questions ariseabout their behavior and performance when training data undergo perturbations. This is the case when anexternal entity maliciously alters training data to invalidate the embedding. This paper explores theeffects of such attacks on some graph datasets by applying different graph-level embedding techniques.The main attack strategy involves manipulating training data to produce an altered model. In thiscontext, our goal is to go in-depth about methods, resources, experimental settings, and performanceresults to observe and study all the aspects that derive from the attack stage.

Adversarial attacks on graph-level embedding methods: a case study

Maurizio Giordano
;
Lucia Maddalena;
2022

Abstract

As the number of graph-level embedding techniques increases at an unprecedented speed, questions ariseabout their behavior and performance when training data undergo perturbations. This is the case when anexternal entity maliciously alters training data to invalidate the embedding. This paper explores theeffects of such attacks on some graph datasets by applying different graph-level embedding techniques.The main attack strategy involves manipulating training data to produce an altered model. In thiscontext, our goal is to go in-depth about methods, resources, experimental settings, and performanceresults to observe and study all the aspects that derive from the attack stage.
2022
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Adversarial attacks
Adversarial machine learning
Graph embedding
Graph Neural Networks
Graph Classification
File in questo prodotto:
File Dimensione Formato  
s10472-022-09811-4.pdf

accesso aperto

Tipologia: Versione Editoriale (PDF)
Licenza: Creative commons
Dimensione 2.99 MB
Formato Adobe PDF
2.99 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/419725
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 8
social impact