D4A: An efficient and effective defense across agnostic adversarial attacks.

Journal: Neural networks : the official journal of the International Neural Network Society
Published Date:

Abstract

Recent studies show that Graph Neural Networks (GNNs) are vulnerable to structure adversarial attacks, which draws attention to adversarial defenses in graph data. Previous defenses designed heuristic defense strategies for specific attacks or graph properties, and are no longer sufficiently robust across all these attacks. To address this problem, we discuss the abnormal behaviors of GNNs in structure perturbations from a posterior distribution perspective. We suggest that the structural vulnerability of GNNs stems from their dependence on local graph smoothing, which can also lead to unfitting - a first-found phenomenon specific to the graph domain. We demonstrate that abnormal behaviors, except for unfitting, can attribute to a posterior distribution shift. To intrinsically prevent the occurrence of abnormal behaviors, we first propose smooth-less message passing to enhance the tolerance with respect to structure perturbations, while significantly mitigating the unfitting. We also propose the distribution shift constraint to restrict other abnormal behaviors of our model. Our approach is evaluated on six different datasets across over four kinds of attacks and compared to 11 representative baselines. The experimental results show that our method improves the defense performance across various attacks, and provides a great trade-off between accuracy and adversarial robustness.

Authors

  • Xianxian Li
    Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China; School of Computer Science and Engineering, Guangxi Normal University, Guilin, China. Electronic address: lixx@gxnu.edu.cn.
  • Zeming Gan
    School of Computer Science and Engineering, Guangxi Normal University, Guilin, China. Electronic address: ganzm@stu.gxnu.edu.cn.
  • Yan Bai
    Department of Radiology, Henan Provincial People's Hospital, China.
  • Linlin Su
    School of Computer Science and Engineering, Guangxi Normal University, Guilin, China. Electronic address: sull@stu.gxnu.edu.cn.
  • De Li
    Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, China; School of Computer Science and Engineering, Guangxi Normal University, Guilin, China.
  • Jinyan Wang
    Key Laboratory of Sustainable and Development of Marine Fisheries, Ministry of Agriculture and Rural Affairs, Yellow Sea Fisheries Research Institute, Chinese Academy of Fishery Sciences, Qingdao, PR China.