Stealthy graph backdoor attack based on feature trigger

Abstract Recent studies have shown that Graph Neural Networks (GNNs) are vulnerable to backdoor attacks. Embedding malicious triggers (e.g., subgraphs or features) in the graph leads to erroneous outputs. Most graph backdoor attacks focus only on the effectiveness of the attack and ignore stealth, w...

Full description

Saved in:
Bibliographic Details
Main Authors: Yang Chen, Zhou Bin, Haixing Zhao
Format: Article
Language:English
Published: Springer 2025-06-01
Series:Complex & Intelligent Systems
Subjects:
Online Access:https://doi.org/10.1007/s40747-025-01934-5
Tags: Add Tag
No Tags, Be the first to tag this record!