Search Results for author: Guohan Huang

Found 4 papers, 3 papers with code

Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs

1 code implementation25 Oct 2022 Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang

Most of the proposed studies launch the backdoor attack using a trigger that either is the randomly generated subgraph (e. g., erd\H{o}s-r\'enyi backdoor) for less computational burden, or the gradient-based generative subgraph (e. g., graph trojaning attack) to enable a more effective attack.

Backdoor Attack

Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection

1 code implementation14 Aug 2022 Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen

Consequently, the link prediction model trained on the backdoored dataset will predict the link with trigger to the target state.

Backdoor Attack Link Prediction

Cannot find the paper you are looking for? You can Submit a new open access paper.