Redirecting to original paper in 30 seconds...
Click below to go immediately or wait for automatic redirect
📄 Abstract
Abstract: Graph Neural Networks (GNNs) have achieved notable success in tasks such as
social and transportation networks. However, recent studies have highlighted
the vulnerability of GNNs to backdoor attacks, raising significant concerns
about their reliability in real-world applications. Despite initial efforts to
defend against specific graph backdoor attacks, existing defense methods face
two main challenges: either the inability to establish a clear distinction
between triggers and clean nodes, resulting in the removal of many clean nodes,
or the failure to eliminate the impact of triggers, making it challenging to
restore the target nodes to their pre-attack state. Through empirical analysis
of various existing graph backdoor attacks, we observe that the triggers
generated by these methods exhibit over-similarity in both features and
structure. Based on this observation, we propose a novel graph backdoor defense
method SimGuard. We first utilizes a similarity-based metric to detect triggers
and then employs contrastive learning to train a backdoor detector that
generates embeddings capable of separating triggers from clean nodes, thereby
improving detection efficiency. Extensive experiments conducted on real-world
datasets demonstrate that our proposed method effectively defends against
various graph backdoor attacks while preserving performance on clean nodes. The
code will be released upon acceptance.
Authors (4)
Chang Liu
Hai Huang
Yujie Xing
Xingquan Zuo
Submitted
February 3, 2025
Key Contributions
Identifies 'over-similarity' in features and structure as a key characteristic of graph backdoor triggers. Proposes SimGuard, a novel defense method that uses a similarity-based metric to detect and mitigate these attacks, addressing limitations of existing defenses.
Business Value
Enhances the security and reliability of graph-based AI systems used in critical infrastructure like social networks and transportation, preventing malicious manipulation and ensuring data integrity.