no code implementations • 7 Sep 2022 • Bingchen Jiang, Zhao Li
After identifying the malicious sample, the explainability of the GNN model can help us capture the most significant subgraph which is probably the trigger in a trojan graph.
Backdoor Attack Graph Classification