Search Results for author: Yuni Lai

Found 9 papers, 3 papers with code

Collective Certified Robustness against Graph Injection Attacks

no code implementations3 Mar 2024 Yuni Lai, Bailin Pan, Kaihuang Chen, Yancheng Yuan, Kai Zhou

We investigate certified robustness for GNNs under graph injection attacks.

Adversarially Robust Signed Graph Contrastive Learning from Balance Augmentation

no code implementations19 Jan 2024 Jialong Zhou, Xing Ai, Yuni Lai, Kai Zhou

Similar to how structure learning can restore unsigned graphs, balance learning can be applied to signed graphs by improving the balance degree of the poisoned graph.

Contrastive Learning Link Sign Prediction

Universally Robust Graph Neural Networks by Preserving Neighbor Similarity

no code implementations18 Jan 2024 Yulin Zhu, Yuni Lai, Xing Ai, Kai Zhou

This theoretical proof explains the empirical observations that the graph attacker tends to connect dissimilar node pairs based on the similarities of neighbor features instead of ego features both on homophilic and heterophilic graphs.

Adversarial Robustness

Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,

no code implementations12 Dec 2023 Yuwei Han, Yuni Lai, Yulin Zhu, Kai Zhou

Graph Neural Networks (GNNs) have become widely used in the field of graph mining.

Graph Mining

Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks

no code implementations7 Dec 2023 Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou

Furthermore, we extend two state-of-the-art certified robustness frameworks to address node injection attacks and compare our approach against them.

Graph Learning Node Classification +1

Coupled-Space Attacks against Random-Walk-based Anomaly Detection

2 code implementations26 Jul 2023 Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou

In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes.

Graph Anomaly Detection

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

1 code implementation18 Jun 2021 Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou

Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques.

Anomaly Detection Combinatorial Optimization +2

Cannot find the paper you are looking for? You can Submit a new open access paper.