From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection

  • Yulin Zhu
  • , Yuni Lai
  • , Kaifa Zhao
  • , Xiapu Luo
  • , Mingquan Yuan
  • , Jun Wu
  • , Jian Ren
  • , Kai Zhou

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

The success of graph neural networks stimulates the prosperity of graph mining and the corresponding downstream tasks including graph anomaly detection (GAD). However, it has been explored that those graph mining methods are vulnerable to structural manipulations on relational data. That is, the attacker can maliciously perturb the graph structures to assist the target nodes in evading anomaly detection. In this article, we explore the structural vulnerability of two typical GAD systems: unsupervised FeXtra-based GAD and supervised graph convolutional network (GCN)-based GAD. Specifically, structural poisoning attacks against GAD are formulated as complex bi-level optimization problems. Our first major contribution is then to transform the bi-level problem into one-level leveraging different regression methods. Furthermore, we propose a new way of utilizing gradient information to optimize the one-level optimization problem in the discrete domain. Comprehensive experiments demonstrate the effectiveness of our proposed attack algorithm <inline-formula> <tex-math notation="LaTeX">$\mathsf{BinarizedAttack}$</tex-math> </inline-formula>.

Original languageEnglish
Pages (from-to)1-14
Number of pages14
JournalIEEE Transactions on Neural Networks and Learning Systems
DOIs
Publication statusPublished - May 2024

Keywords

  • Adversarial graph analysis
  • Anomaly detection
  • discrete optimization
  • graph anomaly detection (GAD)
  • graph neural networks
  • Optimization
  • Representation learning
  • structural poisoning attack
  • Task analysis
  • Topology
  • Training
  • Transforms

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Computer Networks and Communications
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection'. Together they form a unique fingerprint.

Cite this