Preserve, Promote, or Attack? GNN Explanation via Topology Perturbation.
Yi SunAbel N. ValenteSijia LiuDakuo WangPublished in: CoRR (2021)
Keyphrases
- countermeasures
- data sets
- attack detection
- generating explanations
- malicious users
- explanation based learning
- digital watermark
- topological properties
- topology preservation
- cost based abduction
- perturbation method
- counter intuitive
- topology preserving
- voronoi diagram
- intrusion detection
- website
- artificial intelligence
- genetic algorithm