Clean-label backdoor attack on link prediction task
Abstract Graph Neural Networks (GNNs) have shown excellent performance as a powerful tool on link prediction task. Recent studies have shown that link prediction based on GNNs is vulnerable to backdoor attacks. However, existing backdoor attack methods on link prediction task require modification of...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2025-08-01
|
| Series: | Cybersecurity |
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-024-00353-2 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849764037902991360 |
|---|---|
| author | Junming Mo Ming Xu Xiaogang Xing |
| author_facet | Junming Mo Ming Xu Xiaogang Xing |
| author_sort | Junming Mo |
| collection | DOAJ |
| description | Abstract Graph Neural Networks (GNNs) have shown excellent performance as a powerful tool on link prediction task. Recent studies have shown that link prediction based on GNNs is vulnerable to backdoor attacks. However, existing backdoor attack methods on link prediction task require modification of the link state, which results in poor stealthiness of the backdoor. To address this issue, a clean-label backdoor attack method on link prediction task (CL-Link) is proposed in this paper. Specifically, CL-Link utilizes subgraphs as backdoor triggers and achieves trigger injection by attaching subgraphs to target links. In order to enhance the stealthiness of the attack, CL-Link attaches the trigger without modifying the original connection state of the target links. Instead, it utilizes the original connection state as the label, thus minimizing disturbances to the dataset. To ensure the effectiveness of the attack, the gradient information of the model and the similarity between the trigger nodes and the nodes in the graph are used to optimize the features of the trigger nodes. Extensive experiments were performed on multiple benchmark datasets (i.e., Cora, Citeseer, and Pubmed), and the proposed method achieved the highest attack success rate of 97.69% with a poisoning rate of only 5%, which validates the effectiveness of our proposed approach. |
| format | Article |
| id | doaj-art-b490cdb072f040cb8d3a2a6312ce57c8 |
| institution | DOAJ |
| issn | 2523-3246 |
| language | English |
| publishDate | 2025-08-01 |
| publisher | SpringerOpen |
| record_format | Article |
| series | Cybersecurity |
| spelling | doaj-art-b490cdb072f040cb8d3a2a6312ce57c82025-08-20T03:05:14ZengSpringerOpenCybersecurity2523-32462025-08-018111110.1186/s42400-024-00353-2Clean-label backdoor attack on link prediction taskJunming Mo0Ming Xu1Xiaogang Xing2School of Cyberspace, Hangzhou Dianzi UniversitySchool of Cyberspace, Hangzhou Dianzi UniversitySchool of Cyberspace, Hangzhou Dianzi UniversityAbstract Graph Neural Networks (GNNs) have shown excellent performance as a powerful tool on link prediction task. Recent studies have shown that link prediction based on GNNs is vulnerable to backdoor attacks. However, existing backdoor attack methods on link prediction task require modification of the link state, which results in poor stealthiness of the backdoor. To address this issue, a clean-label backdoor attack method on link prediction task (CL-Link) is proposed in this paper. Specifically, CL-Link utilizes subgraphs as backdoor triggers and achieves trigger injection by attaching subgraphs to target links. In order to enhance the stealthiness of the attack, CL-Link attaches the trigger without modifying the original connection state of the target links. Instead, it utilizes the original connection state as the label, thus minimizing disturbances to the dataset. To ensure the effectiveness of the attack, the gradient information of the model and the similarity between the trigger nodes and the nodes in the graph are used to optimize the features of the trigger nodes. Extensive experiments were performed on multiple benchmark datasets (i.e., Cora, Citeseer, and Pubmed), and the proposed method achieved the highest attack success rate of 97.69% with a poisoning rate of only 5%, which validates the effectiveness of our proposed approach.https://doi.org/10.1186/s42400-024-00353-2Backdoor attacksLink predictionGraph neural networksClean label |
| spellingShingle | Junming Mo Ming Xu Xiaogang Xing Clean-label backdoor attack on link prediction task Cybersecurity Backdoor attacks Link prediction Graph neural networks Clean label |
| title | Clean-label backdoor attack on link prediction task |
| title_full | Clean-label backdoor attack on link prediction task |
| title_fullStr | Clean-label backdoor attack on link prediction task |
| title_full_unstemmed | Clean-label backdoor attack on link prediction task |
| title_short | Clean-label backdoor attack on link prediction task |
| title_sort | clean label backdoor attack on link prediction task |
| topic | Backdoor attacks Link prediction Graph neural networks Clean label |
| url | https://doi.org/10.1186/s42400-024-00353-2 |
| work_keys_str_mv | AT junmingmo cleanlabelbackdoorattackonlinkpredictiontask AT mingxu cleanlabelbackdoorattackonlinkpredictiontask AT xiaogangxing cleanlabelbackdoorattackonlinkpredictiontask |