Backdoor Attacks to Graph Neural Networks.
Zaixi ZhangJinyuan JiaBinghui WangNeil Zhenqiang GongPublished in: CoRR (2020)
Keyphrases
- neural network
- graph theory
- pattern recognition
- graph matching
- connected components
- genetic algorithm
- graph structure
- fuzzy logic
- back propagation
- random walk
- graph representation
- neural nets
- countermeasures
- weighted graph
- security risks
- random graphs
- spanning tree
- graph databases
- graph model
- graph mining
- multi layer
- artificial neural networks
- directed graph
- directed acyclic graph
- training process
- multilayer perceptron
- security protocols
- structured data