Graph Contrastive Backdoor Attacks.
Hangfan ZhangJinghui ChenLu LinJinyuan JiaDinghao WuPublished in: ICML (2023)
Keyphrases
- directed graph
- random walk
- graph structure
- graph representation
- countermeasures
- graph theoretic
- graph data
- malicious attacks
- watermarking scheme
- graph model
- bipartite graph
- dependency graph
- denial of service attacks
- graph mining
- graph databases
- spanning tree
- data mining
- traffic analysis
- security risks
- graph based algorithm