Black-box attacks on dynamic graphs via adversarial topology perturbations.

Journal: Neural networks : the official journal of the International Neural Network Society
PMID:

Abstract

Research and analysis of attacks on dynamic graph is beneficial for information systems to investigate vulnerabilities and strength abilities in resisting malicious attacks. Existing attacks on dynamic graphs mainly focus on rewiring original graph structures, which are often infeasible in real-world scenarios. To address this issue, we adopt a novel strategy by injecting both fake nodes and links to attack dynamic graphs. Based on that, we present the first study on attacking dynamic graphs via adversarial topology perturbations in a restricted black-box setting, in which downstream graph learning tasks are unknown. Specifically, we first divide dynamic graph structure perturbations into three sub-tasks and transform them as a sequential decision making process. Then, we propose a hierarchical reinforcement learning based black-box attack (HRBBA) framework to model three sub-tasks as attack policies. In addition, an imperceptible perturbation constraint to guarantee the concealment of attacks is incorporated into HRBBA. Finally, HRBBA is optimized based on the actor-critic process. Extensive experiments on four real-world dynamic graphs show that the performance of diverse dynamic graph learning methods (victim methods) on tasks like link prediction, node classification and network clustering can be substantially degraded under HRBBA attack.

Authors

  • Haicheng Tao
    College of Information Engineering, Nanjing University of Finance and Economic, 3 Wenyuan Road, Nanjing, 210023, Jiangsu, China.
  • Jie Cao
    College of Veterinary Medicine, China Agricultural University, Beijing, China.
  • Lei Chen
    Department of Chemistry, Stony Brook University Stony Brook NY USA.
  • Hongliang Sun
    College of Information Engineering, Nanjing University of Finance and Economic, 3 Wenyuan Road, Nanjing, 210023, Jiangsu, China.
  • Yong Shi
    Research Center on Fictitious Economy and Data Science, Chinese Academy of Sciences, Beijing 100190, China; Key Laboratory of Big Data Mining and Knowledge Management, Chinese Academy of Sciences, Beijing 100190, China; College of Information Science and Technology, University of Nebraska at Omaha, Omaha, NE 68182, USA. Electronic address: yshi@ucas.ac.cn.
  • Xingquan Zhu