Rethinking the Trigger-injecting Position in Graph Backdoor Attack.
Jing XuGorka AbadStjepan PicekPublished in: CoRR (2023)
Keyphrases
- graph theory
- random walk
- attack graph
- bipartite graph
- graph representation
- weighted graph
- spanning tree
- graph model
- graph structure
- structured data
- directed acyclic graph
- countermeasures
- graph search
- stable set
- graph mining
- position and orientation
- graph matching
- graph theoretic
- dependency graph
- graph based algorithm
- image segmentation