A Black-Box Adversarial Attack Method Via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural Networks
Shu Zhao,Wenyu Wang,Ziwei Du,Jie Chen,Zhen Duan
DOI: https://doi.org/10.1109/tbdata.2023.3296936
2023-01-01
IEEE Transactions on Big Data
Abstract:Recent studies have shown that Graph Neural Networks (GNNs) are vulnerable to well-designed and imperceptible adversarial attack. Attacks utilizing gradient information are widely used in the field of attack due to their simplicity and efficiency. However, several challenges are faced by gradient-based attacks: 1) Generate perturbations use white-box attacks (i.e., requiring access to the full knowledge of the model), which is not practical in the real world; 2) It is easy to drop into local optima; and 3) The perturbation budget is not limited and might be detected even if the number of modified edges is small. Faced with the above challenges, this article proposes a black-box adversarial attack method, named NAG-R, which consists of two modules known as N esterov A ccelerated G radient attack module and R ewiring optimization module. Specifically, inspired by adversarial attacks on images, the first module generates perturbations by introducing Nesterov Accelerated Gradient (NAG) to avoid falling into local optima. The second module keeps the fundamental properties of the graph (e.g., the total degree of the graph) unchanged through a rewiring operation, thus ensuring that perturbations are imperceptible. Intensive experiments show that our method has significant attack success and transferability over existing state-of-the-art gradient-based attack methods.
What problem does this paper attempt to address?