Clean-label backdoor attack on link prediction task
Abstract Graph Neural Networks (GNNs) have shown excellent performance as a powerful tool on link prediction task. Recent studies have shown that link prediction based on GNNs is vulnerable to backdoor attacks. However, existing backdoor attack methods on link prediction task require modification of...
| Published in: | Cybersecurity |
|---|---|
| Main Authors: | Junming Mo, Ming Xu, Xiaogang Xing |
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2025-08-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-024-00353-2 |
Similar Items
Homophily-Guided Backdoor Attacks on GNN-Based Link Prediction
by: Yadong Wang, et al.
Published: (2025-09-01)
by: Yadong Wang, et al.
Published: (2025-09-01)
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
by: Arthur Mercier, et al.
Published: (2023-05-01)
by: Arthur Mercier, et al.
Published: (2023-05-01)
CleanSheet: Advancing backdoor attack techniques for deep neural networks with stealthy trigger embedding
by: Ahmed Bensaoud, et al.
Published: (2025-12-01)
by: Ahmed Bensaoud, et al.
Published: (2025-12-01)
A Backdoor Approach With Inverted Labels Using Dirty Label-Flipping Attacks
by: Orson Mengara
Published: (2025-01-01)
by: Orson Mengara
Published: (2025-01-01)
Survey on Backdoor Attacks and Countermeasures in Deep Neural Network
by: QIAN Hanwei, SUN Weisong
Published: (2023-05-01)
by: QIAN Hanwei, SUN Weisong
Published: (2023-05-01)
Defending Against Backdoor Attacks by Quarantine Training
by: Chengxu Yu, et al.
Published: (2024-01-01)
by: Chengxu Yu, et al.
Published: (2024-01-01)
Instance-Agnostic and Practical Clean Label Backdoor Attack Method for Deep Learning Based Face Recognition Models
by: Tae-Hoon Kim, et al.
Published: (2023-01-01)
by: Tae-Hoon Kim, et al.
Published: (2023-01-01)
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
by: Donik Vrsnak, et al.
Published: (2025-01-01)
by: Donik Vrsnak, et al.
Published: (2025-01-01)
Sub-Band Backdoor Attack in Remote Sensing Imagery
by: Kazi Aminul Islam, et al.
Published: (2024-04-01)
by: Kazi Aminul Islam, et al.
Published: (2024-04-01)
Defense Method Against Backdoor Attack in Federated Learning for Industrial Scenarios
by: WANG Xun, XU Fangmin, ZHAO Chenglin, LIU Hongfu
Published: (2024-01-01)
by: WANG Xun, XU Fangmin, ZHAO Chenglin, LIU Hongfu
Published: (2024-01-01)
Stealthy graph backdoor attack based on feature trigger
by: Yang Chen, et al.
Published: (2025-06-01)
by: Yang Chen, et al.
Published: (2025-06-01)
Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey
by: Yudong Li, et al.
Published: (2023-01-01)
by: Yudong Li, et al.
Published: (2023-01-01)
Exploring Graph Neural Backdoors in Vehicular Networks: Fundamentals, Methodologies, Applications, and Future Perspectives
by: Xiao Yang, et al.
Published: (2025-01-01)
by: Xiao Yang, et al.
Published: (2025-01-01)
A survey of backdoor attacks and defences: From deep neural networks to large language models
by: Ling-Xin Jin, et al.
Published: (2025-09-01)
by: Ling-Xin Jin, et al.
Published: (2025-09-01)
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
by: Wei Guo, et al.
Published: (2022-01-01)
by: Wei Guo, et al.
Published: (2022-01-01)
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
by: Jinyin CHEN, et al.
Published: (2023-04-01)
by: Jinyin CHEN, et al.
Published: (2023-04-01)
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
by: Jinyin CHEN, et al.
Published: (2023-04-01)
by: Jinyin CHEN, et al.
Published: (2023-04-01)
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems
by: Quentin Le Roux, et al.
Published: (2024-01-01)
by: Quentin Le Roux, et al.
Published: (2024-01-01)
Research Progress of Backdoor Attacks in Deep Neural Networks
by: HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang
Published: (2023-09-01)
by: HUANG Shuxin, ZHANG Quanxin, WANG Yajie, ZHANG Yaoyuan, LI Yuanzhang
Published: (2023-09-01)
Camouflage Backdoor Attack against Pedestrian Detection
by: Yalun Wu, et al.
Published: (2023-11-01)
by: Yalun Wu, et al.
Published: (2023-11-01)
A4FL: Federated Adversarial Defense via Adversarial Training and Pruning Against Backdoor Attack
by: Saeed-Uz-Zaman, et al.
Published: (2025-01-01)
by: Saeed-Uz-Zaman, et al.
Published: (2025-01-01)
Vulnerability analysis of federated learning malware detection systems based on backdoor attacks
by: LU Xingyu; CAO Yang
Published: (2024-09-01)
by: LU Xingyu; CAO Yang
Published: (2024-09-01)
DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models
by: Jianbin Ye, et al.
Published: (2022-06-01)
by: Jianbin Ye, et al.
Published: (2022-06-01)
DLP: towards active defense against backdoor attacks with decoupled learning process
by: Zonghao Ying, et al.
Published: (2023-05-01)
by: Zonghao Ying, et al.
Published: (2023-05-01)
Backdoor Attack on Deep Learning Models:A Survey
by: YING Zonghao, WU Bin
Published: (2023-03-01)
by: YING Zonghao, WU Bin
Published: (2023-03-01)
Text Select-Backdoor: Selective Backdoor Attack for Text Recognition Systems
by: Hyun Kwon, et al.
Published: (2024-01-01)
by: Hyun Kwon, et al.
Published: (2024-01-01)
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning
by: Jianyi Zhang, et al.
Published: (2024-08-01)
by: Jianyi Zhang, et al.
Published: (2024-08-01)
A Backdoor Attack Against LSTM-Based Text Classification Systems
by: Jiazhu Dai, et al.
Published: (2019-01-01)
by: Jiazhu Dai, et al.
Published: (2019-01-01)
STING: A Stealthy Backdoor Attack on GNN-Based Malicious Domain Detection via DNS Perturbations
by: Muhammad Anan, et al.
Published: (2025-01-01)
by: Muhammad Anan, et al.
Published: (2025-01-01)
Backdoor Attack against Face Sketch Synthesis
by: Shengchuan Zhang, et al.
Published: (2023-06-01)
by: Shengchuan Zhang, et al.
Published: (2023-06-01)
Backdoor defense method in federated learning based on contrastive training
by: Jiale ZHANG, et al.
Published: (2024-03-01)
by: Jiale ZHANG, et al.
Published: (2024-03-01)
Backdoor defense method in federated learning based on contrastive training
by: Jiale ZHANG, et al.
Published: (2024-03-01)
by: Jiale ZHANG, et al.
Published: (2024-03-01)
Research on method and architecture for defense assessment of artificial intelligence backdoors
by: XIE Tian, et al.
Published: (2024-09-01)
by: XIE Tian, et al.
Published: (2024-09-01)
EEG-Based Brain–Computer Interfaces are Vulnerable to Backdoor Attacks
by: Lubin Meng, et al.
Published: (2023-01-01)
by: Lubin Meng, et al.
Published: (2023-01-01)
A sparse and invisible targeted backdoor attack in federated learning
by: Qikun Zhang, et al.
Published: (2025-07-01)
by: Qikun Zhang, et al.
Published: (2025-07-01)
FLARE: A Backdoor Attack to Federated Learning with Refined Evasion
by: Qingya Wang, et al.
Published: (2024-11-01)
by: Qingya Wang, et al.
Published: (2024-11-01)
Federated Learning Backdoor Attack Based on Frequency Domain Injection
by: Jiawang Liu, et al.
Published: (2024-02-01)
by: Jiawang Liu, et al.
Published: (2024-02-01)
Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization
by: JIANG Yufei, TIAN Yulong, ZHAO Yanchao
Published: (2025-04-01)
by: JIANG Yufei, TIAN Yulong, ZHAO Yanchao
Published: (2025-04-01)
Survey on Backdoor Attacks on Deep Learning: Current Trends, Categorization, Applications, Research Challenges, and Future Prospects
by: Muhammad Abdullah Hanif, et al.
Published: (2025-01-01)
by: Muhammad Abdullah Hanif, et al.
Published: (2025-01-01)
CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation
by: CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu
Published: (2024-03-01)
by: CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu
Published: (2024-03-01)
Similar Items
-
Homophily-Guided Backdoor Attacks on GNN-Based Link Prediction
by: Yadong Wang, et al.
Published: (2025-09-01) -
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
by: Arthur Mercier, et al.
Published: (2023-05-01) -
CleanSheet: Advancing backdoor attack techniques for deep neural networks with stealthy trigger embedding
by: Ahmed Bensaoud, et al.
Published: (2025-12-01) -
A Backdoor Approach With Inverted Labels Using Dirty Label-Flipping Attacks
by: Orson Mengara
Published: (2025-01-01) -
Survey on Backdoor Attacks and Countermeasures in Deep Neural Network
by: QIAN Hanwei, SUN Weisong
Published: (2023-05-01)
