Rethinking the Trigger-injecting Position in Graph Backdoor Attack.
Jing XuGorka AbadStjepan PicekPublished in: IJCNN (2023)
Keyphrases
- graph representation
- graph theory
- attack graph
- directed graph
- data sets
- random walk
- bipartite graph
- dependency graph
- graph mining
- graph databases
- graph model
- stable set
- dos attacks
- graph search
- graph theoretic
- countermeasures
- position and orientation
- link analysis
- weighted graph
- graph structure
- structured data
- optimal solution