Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Conference Paper (2023)
Authors

Jing Xu (TU Delft - Cyber Security)

Gorka Abad (Radboud Universiteit Nijmegen, Ikerlan research centre)

S. Picek (TU Delft - Cyber Security, Radboud Universiteit Nijmegen)

Research Group
Cyber Security
Copyright
© 2023 J. Xu, Gorka Abad, S. Picek
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 J. Xu, Gorka Abad, S. Picek
Research Group
Cyber Security
Pages (from-to)
1-8
ISBN (print)
978-1-6654-8868-6
ISBN (electronic)
978-1-6654-8867-9
DOI:
https://doi.org/10.1109/IJCNN54540.2023.10191949
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Backdoor attacks have been demonstrated as a security threat for machine learning models. Traditional backdoor attacks intend to inject backdoor functionality into the model such that the backdoored model will perform abnormally on inputs with predefined backdoor triggers and still retain state-of-the-art performance on the clean inputs. While there are already some works on backdoor attacks on Graph Neural Networks (GNNs), the backdoor trigger in the graph domain is mostly injected into random positions of the sample. There is no work analyzing and explaining the backdoor attack performance when injecting triggers into the most important or least important area in the sample, which we refer to as trigger-injecting strategies MIAS and LIAS, respectively. Our results show that, generally, LIAS performs better, and the differences between the LIAS and MIAS performance can be significant. Furthermore, we explain these two strategies’ similar (better) attack performance through explanation techniques, which results in a further understanding of backdoor attacks in GNNs.

Files

Rethinking_the_Trigger_injecti... (pdf)
(pdf | 1.39 Mb)
- Embargo expired in 02-02-2024
License info not available