1 code implementation • 25 Oct 2022 • Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang
Most of the proposed studies launch the backdoor attack using a trigger that either is the randomly generated subgraph (e. g., erd\H{o}s-r\'enyi backdoor) for less computational burden, or the gradient-based generative subgraph (e. g., graph trojaning attack) to enable a more effective attack.
1 code implementation • 14 Aug 2022 • Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen
Consequently, the link prediction model trained on the backdoored dataset will predict the link with trigger to the target state.