Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks

📅 2025-03-12
🏛️ IEEE Transactions on Dependable and Secure Computing
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Graph Neural Networks (GNNs) are vulnerable to fixed-pattern backdoor attacks; existing methods fail to adequately model graph topology and node characteristics, resulting in implausible and poorly concealed triggers. This paper proposes ABARC—the first backdoor attack framework jointly optimizing plausibility constraints and adaptivity—supporting both graph-level and node-level tasks. Its core contributions include: (i) a dynamic trigger generation mechanism grounded in graph/node similarity, feature-range constraints, and type-awareness; (ii) synergistic subgraph-trigger modeling and adaptive edge pruning to enhance both attack success rate (ASR) and stealth; and (iii) robustness-aware evaluation under randomized smoothing defenses. Experiments demonstrate that ABARC achieves an ASR of 94.2% while incurring less than 0.5% clean accuracy drop (CAD), outperforming the state-of-the-art by 7.3%—significantly alleviating the fundamental trade-off between effectiveness and stealth.

Technology Category

Application Category

📝 Abstract
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individual graph characteristics and rendering insufficient evasiveness. To tackle the above issues, we propose ABARC, the first Adaptive Backdoor Attack with Reasonable Constraints, applying to both graph-level and node-level tasks in GNNs. For graph-level tasks, we propose a subgraph backdoor attack independent of the graph's topology. It dynamically selects trigger nodes for each target graph and modifies node features with constraints based on graph similarity, feature range, and feature type. For node-level tasks, our attack begins with an analysis of node features, followed by selecting and modifying trigger features, which are then constrained by node similarity, feature range, and feature type. Furthermore, an adaptive edge-pruning mechanism is designed to reduce the impact of neighbors on target nodes, ensuring a high attack success rate (ASR). Experimental results show that even with reasonable constraints for attack evasiveness, our attack achieves a high ASR while incurring a marginal clean accuracy drop (CAD). When combined with the state-of-the-art defense randomized smoothing (RS) method, our attack maintains an ASR over 94%, surpassing existing attacks by more than 7%.
Problem

Research questions and friction points this paper is trying to address.

Addresses vulnerability of GNNs to backdoor attacks
Proposes adaptive backdoor attack with reasonable constraints
Ensures high attack success rate with minimal accuracy drop
Innovation

Methods, ideas, or system contributions that make the work stand out.

Adaptive Backdoor Attack with Reasonable Constraints (ABARC)
Dynamic trigger selection based on graph characteristics
Adaptive edge-pruning for high attack success rate
🔎 Similar Papers
No similar papers found.
Xuewen Dong
Xuewen Dong
Xidian University
J
Jiachen Li
School of Computer Science and Technology, Xidian University, the Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, and also with the Shaanxi Key Laboratory of Blockchain and Secure Computing, Xi’an 710071, China
S
Shujun Li
School of Computing & Institute of Cyber Security for Society (iCSS), University of Kent, Canterbury, CT2 7NP, U.K.
Z
Zhichao You
School of Computer Science and Technology, Xidian University, the Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, and also with the Shaanxi Key Laboratory of Blockchain and Secure Computing, Xi’an 710071, China
Qiang Qu
Qiang Qu
Professor, Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology
BlockchainData IntelligenceData-intensive SystemsData Mining
Yaroslav Kholodov
Yaroslav Kholodov
Full professor of Innopolis University
Data analysisIntelligent transportation systemsNumerical methodsApplied mathematics
Yulong Shen
Yulong Shen
Xidian University
computer security