通信学报 ›› 2023, Vol. 44 ›› Issue (4): 154-166.doi: 10.11959/j.issn.1000-436x.2023074

• 学术论文 • 上一篇    下一篇

基于对比学习的图神经网络后门攻击防御方法

陈晋音1,2, 熊海洋2, 马浩男2, 郑雅羽2   

  1. 1 浙江工业大学网络空间安全研究院,浙江 杭州 310023
    2 浙江工业大学信息工程学院,浙江 杭州 310023
  • 修回日期:2023-03-08 出版日期:2023-04-01 发布日期:2023-04-01
  • 作者简介:陈晋音(1982- ),女,浙江象山人,博士,浙江工业大学教授、博士生导师,主要研究方向为人工智能安全、图数据挖掘和进化计算等
    熊海洋(1998- ),男,江西南昌人,浙江工业大学硕士生,主要研究方向为深度学习、人工智能安全和图数据挖掘
    马浩男(2000- ),男,浙江杭州人,浙江工业大学硕士生,主要研究方向为深度学习、人工智能安全和图数据挖掘
    郑雅羽(1978- ),男,浙江温州人,博士,浙江工业大学副教授、硕士生导师,主要研究方向为嵌入式软硬件应用开发、视频图像处理算法、服务器网络技术等
  • 基金资助:
    国家自然科学基金资助项目(62072406);浙江省自然科学基金资助项目(LDQ23F020001);信息系统安全国家科技重点实验室基金资助项目(61421110502);浙江省重点研发计划基金资助项目(2022C01018)

CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack

Jinyin CHEN1,2, Haiyang XIONG2, Haonan MA2, Yayu ZHENG2   

  1. 1 Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310023, China
    2 College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China
  • Revised:2023-03-08 Online:2023-04-01 Published:2023-04-01
  • Supported by:
    The National Natural Science Foundation of China(62072406);The Zhejiang Provincial Natural Science Foundation(LDQ23F020001);The Chinese National Key Laboratory of Science and Technology on Information System Secu-rity(61421110502);The Key Research and Development Program of Zhejiang Province(2022C01018)

摘要:

针对现有的后门攻击防御方法难以处理非规则的非结构化的离散的图数据的问题,为了缓解图神经网络后门攻击的威胁,提出了一种基于对比学习的图神经网络后门攻击防御方法(CLB-Defense)。具体来说,基于对比学习无监督训练的对比模型查找可疑后门样本,采取图重要性指标以及标签平滑策略去除训练数据集中的扰动,实现对图后门攻击的防御。最终,在4个真实数据集和5主流后门攻击方法上展开防御验证,结果显示CLB-Defense能够平均降低75.66%的攻击成功率(与对比算法相比,改善了54.01%)。

关键词: 图神经网络, 后门攻击, 鲁棒性, 防御, 对比学习

Abstract:

For the problem that the existing backdoor attack defense methods are difficult to deal with irregular and unstructured discrete graph data to alleviate the threat of backdoor attacks, a backdoor attack defense method for GNN based on contrastive learning was proposed, namely CLB-Defense.Specifically, a contrastive model was built by using contrastive learning in an unsupervised way, which searches suspicious backdoored samples.Then the suspicious backdoored samples were reshaped by using the graph importance indexes and the label smoothing strategy, and the defense against graph backdoor attack was realized.Finally, extensive experimental results show that CLB-Defense realizes the effect of defense performance on four public datasets and five popular graph backdoor attacks, e.g., CLB-Defense can reduce the attack success rate by an average of 75.66% (compared with the baselines, an improvement of 54.01%).

Key words: graph neural network, backdoor attack, robustness, defense, contrastive learning

中图分类号: 

No Suggested Reading articles found!