The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques.
Huijun WuChen WangYuriy TyshetskiyAndrew DochertyKai LuLiming ZhuPublished in: CoRR (2019)
Keyphrases
- countermeasures
- security vulnerabilities
- security risks
- security flaws
- security mechanisms
- attack graph
- buffer overflow
- graph structure
- weighted graph
- fully connected
- average degree
- graph model
- attack graphs
- edge weights
- small world
- overlapping communities
- complex networks
- random walk
- bipartite graph
- graph theory
- degree distribution
- clustering coefficient
- social networks
- community discovery
- security breaches
- directed acyclic graph
- biological networks
- computer networks
- data corruption
- attack scenarios
- security issues
- alert correlation
- spanning tree
- sql injection
- directed edges
- graph representation
- deep learning
- network effects
- network analysis
- cyber attacks
- authentication scheme