Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques

Rupesh Raj Karn, Ozgur Sinanoglu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a first-of-its-kind systematic analysis of various backdoor attacks on Graph Convolution Neural Networks (GCNNs). By implementing a wide range of backdoor attack strategies, including trigger node injection, edge modification, feature poisoning, subgraph manipulation, etc., we evaluate the degradation in classification accuracy for target classes and assess the collateral impact on non-target class predictions. Using the widely established Cora and Amazon Co-purchase Network datasets, we provide important case studies and reference points for both attackers and security defenders, sharing essential insights into the severity of each attack method. Our findings highlight the vulnerability of GCNNs to different types of backdoor attacks, underscoring the need for robust defense mechanisms. This work aims to serve as a first-of-its-kind reference for future research in developing and evaluating security measures for GCNNs and GNNs in general.

Original languageEnglish (US)
Title of host publicationSecurity, Privacy, and Applied Cryptography Engineering - 14th International Conference, SPACE 2024, Proceedings
EditorsJohann Knechtel, Urbi Chatterjee, Domenic Forte
PublisherSpringer Science and Business Media Deutschland GmbH
Pages149-174
Number of pages26
ISBN (Print)9783031804076
DOIs
StatePublished - 2025
Event14th International Conference on Security, Privacy and Applied Cryptographic Engineering, SPACE 2024 - Kottayam, India
Duration: Dec 14 2024Dec 17 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume15351 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Security, Privacy and Applied Cryptographic Engineering, SPACE 2024
Country/TerritoryIndia
CityKottayam
Period12/14/2412/17/24

Keywords

  • Backdoor Attack
  • Benchmark
  • Graph Convolution Neural Networks
  • Poisoning
  • Target Label
  • Trigger Class

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques'. Together they form a unique fingerprint.

Cite this