1 code implementation • 25 Oct 2022 • Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang
Most of the proposed studies launch the backdoor attack using a trigger that either is the randomly generated subgraph (e. g., erd\H{o}s-r\'enyi backdoor) for less computational burden, or the gradient-based generative subgraph (e. g., graph trojaning attack) to enable a more effective attack.
1 code implementation • 14 Aug 2022 • Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen
Consequently, the link prediction model trained on the backdoored dataset will predict the link with trigger to the target state.
1 code implementation • 13 Oct 2021 • Jinyin Chen, Guohan Huang, Haibin Zheng, Shanqing Yu, Wenrong Jiang, Chen Cui
This is the first study of adversarial attacks on GVFL.
no code implementations • 24 Feb 2021 • Jinyin Chen, Xiang Lin, Dunjie Zhang, Wenrong Jiang, Guohan Huang, Hui Xiong, Yun Xiang
To the best of our knowledge, this is the first targeted label attack technique.