Fast Inference of Removal-Based Node Influence (2403.08333v3)
Abstract: Graph neural networks (GNNs) are widely utilized to capture the information spreading patterns in graphs. While remarkable performance has been achieved, there is a new trending topic of evaluating node influence. We propose a new method of evaluating node influence, which measures the prediction change of a trained GNN model caused by removing a node. A real-world application is, "In the task of predicting Twitter accounts' polarity, had a particular account been removed, how would others' polarity change?". We use the GNN as a surrogate model whose prediction could simulate the change of nodes or edges caused by node removal. Our target is to obtain the influence score for every node, and a straightforward way is to alternately remove every node and apply the trained GNN on the modified graph to generate new predictions. It is reliable but time-consuming, so we need an efficient method. The related lines of work, such as graph adversarial attack and counterfactual explanation, cannot directly satisfy our needs, since their problem settings are different. We propose an efficient, intuitive, and effective method, NOde-Removal-based fAst GNN inference (NORA), which uses the gradient information to approximate the node-removal influence. It only costs one forward propagation and one backpropagation to approximate the influence score for all nodes. Extensive experiments on six datasets and six GNN models verify the effectiveness of NORA. Our code is available at https://github.com/weikai-li/NORA.git.
- Robust Counterfactual Explanations on Graph Neural Networks. CoRR abs/2107.04086 (2021). arXiv:2107.04086 https://arxiv.org/abs/2107.04086
- Link and node removal in real social networks: a review. Frontiers in Physics 8 (2020), 228.
- Time and space complexity of graph convolutional networks. Accessed on: Dec 31 (2021).
- Simple and Deep Graph Convolutional Networks. In Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 119), Hal Daumé III and Aarti Singh (Eds.). PMLR, 1725–1735. https://proceedings.mlr.press/v119/chen20v.html
- Understanding and Improving Graph Injection Attack by Promoting Unnoticeability. https://doi.org/10.48550/ARXIV.2202.08057
- A topological analysis of the Italian electric power grid. Physica A: Statistical mechanics and its applications 338, 1-2 (2004), 92–97.
- A Targeted Universal Attack on Graph Convolutional Network. CoRR abs/2011.14365 (2020). arXiv:2011.14365 https://arxiv.org/abs/2011.14365
- Pedro Domingos and Matt Richardson. 2001. Mining the Network Value of Customers. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (San Francisco, California) (KDD ’01). Association for Computing Machinery, New York, NY, USA, 57–66. https://doi.org/10.1145/502512.502525
- Neural Message Passing for Quantum Chemistry. CoRR abs/1704.01212 (2017). arXiv:1704.01212 http://arxiv.org/abs/1704.01212
- Information diffusion through blogspace. In Proceedings of the 13th international conference on World Wide Web. 491–501.
- Inductive Representation Learning on Large Graphs. CoRR abs/1706.02216 (2017). arXiv:1706.02216 http://arxiv.org/abs/1706.02216
- Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770–778.
- P Holme. 2004. Efficient local strategies for vaccination and network attack. Europhysics Letters (EPL) 68, 6 (dec 2004), 908–914. https://doi.org/10.1209/epl/i2004-10286-2
- Open Graph Benchmark: Datasets for Machine Learning on Graphs. CoRR abs/2005.00687 (2020). arXiv:2005.00687 https://arxiv.org/abs/2005.00687
- Community-based influence maximization for viral marketing. Applied Intelligence 49 (2019), 2137–2150.
- Global Counterfactual Explainer for Graph Neural Networks. In Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining. 141–149.
- Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. pmlr, 448–456.
- A hybrid algorithm based on community detection and multi attribute decision making for influence maximization. Computers & Industrial Engineering 120 (2018), 234–250.
- Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia. 675–678.
- Black-box Node Injection Attack for Graph Neural Networks. https://doi.org/10.48550/ARXIV.2202.09389
- Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinforcement Learning. https://doi.org/10.48550/ARXIV.2211.10782
- Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
- Thomas N. Kipf and Max Welling. 2016. Semi-Supervised Classification with Graph Convolutional Networks. CoRR abs/1609.02907 (2016). arXiv:1609.02907 http://arxiv.org/abs/1609.02907
- The dynamics of viral marketing. ACM Transactions on the Web (TWEB) 1, 1 (2007), 5–es.
- Patterns of cascading behavior in large blog graphs. In Proceedings of the 2007 SIAM international conference on data mining. SIAM, 551–556.
- An influence maximization method based on crowd emotion under an emotion-based attribute social network. Information Processing & Management 59, 2 (2022), 102818.
- Yuchong Li and Qinghui Liu. 2021. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports 7 (2021), 8176–8186.
- Balanced influence maximization in attributed social network based on sampling. In Proceedings of the 13th International Conference on Web Search and Data Mining. 375–383.
- Deep graph representation learning and optimization for influence maximization. In International Conference on Machine Learning. PMLR, 21350–21361.
- A Learning Convolutional Neural Network Approach for Network Robustness Prediction. IEEE Transactions on Cybernetics (2022), 1–14. https://doi.org/10.1109/tcyb.2022.3207878
- CF-GNNExplainer: Counterfactual Explanations for Graph Neural Networks. CoRR abs/2102.03322 (2021). arXiv:2102.03322 https://arxiv.org/abs/2102.03322
- Parameterized Explainer for Graph Neural Network. CoRR abs/2011.04573 (2020). arXiv:2011.04573 https://arxiv.org/abs/2011.04573
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem. CoRR abs/2106.10785 (2021). arXiv:2106.10785 https://arxiv.org/abs/2106.10785
- Clear: Generative counterfactual explanations on graphs. Advances in Neural Information Processing Systems 35 (2022), 25895–25907.
- More Effective Centrality-Based Attacks on Weighted Networks. https://doi.org/10.48550/ARXIV.2211.09345
- Efficient Estimation of Word Representations in Vector Space. arXiv:1301.3781 [cs.CL]
- Distributed Representations of Words and Phrases and their Compositionality. arXiv:1310.4546 [cs.CL]
- A billion-scale approximation algorithm for maximizing benefit in viral marketing. IEEE/ACM Transactions On Networking 25, 4 (2017), 2419–2429.
- Conditional attack strategy for real-world complex networks. Physica A: Statistical Mechanics and its Applications 530 (2019), 121561.
- Embedding-aided network dismantling. https://doi.org/10.48550/ARXIV.2208.01087
- Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems 28 (2015).
- Efficient GNN Explanation via Learning Removal-based Attribution. arXiv:2306.05760 [cs.LG]
- ImageNet Large Scale Visual Recognition Challenge. arXiv:1409.0575 [cs.CV]
- Collective Classification in Network Data. AI Mag. 29 (2008), 93–106.
- Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
- A Survey of Contrastive and Counterfactual Explanation Generation Methods for Explainable Artificial Intelligence. IEEE Access 9 (2021), 11974–12001. https://doi.org/10.1109/ACCESS.2021.3051315
- RLIM: representation learning method for influence maximization in social networks. International Journal of Machine Learning and Cybernetics 13, 11 (2022), 3425–3440.
- Adversarial attacks on graph neural networks via node injections: A hierarchical reinforcement learning approach. In Proceedings of the Web Conference 2020. 673–683.
- Going deeper with convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1–9.
- Learning and Evaluating Graph Neural Network Explanations based on Counterfactual and Factual Reasoning. In Proceedings of the ACM Web Conference 2022. ACM. https://doi.org/10.1145/3485447.3511948
- Single Node Injection Attack against Graph Neural Networks. In Proceedings of the 30th ACM International Conference on Information and Knowledge Management. ACM. https://doi.org/10.1145/3459637.3482393
- Deep reinforcement learning-based approach to tackle topic-aware influence maximization. Data Science and Engineering 5 (2020), 1–11.
- Graph Attention Networks. https://doi.org/10.48550/ARXIV.1710.10903
- Attacking Fake News Detectors via Manipulating News Social Engagement. arXiv:2302.07363 [cs.SI]
- Scalable Attack on Graph Data by Injecting Vicious Nodes. CoRR abs/2004.13825 (2020). arXiv:2004.13825 https://arxiv.org/abs/2004.13825
- Immunity of multiplex networks via acquaintance vaccination. Europhysics Letters 112, 4 (2015), 48002.
- Counterfactual Supporting Facts Extraction for Explainable Medical Record Based Diagnosis with Graph Network. In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Online, 1942–1955. https://doi.org/10.18653/v1/2021.naacl-main.156
- TIMME: Twitter ideology-detection via multi-task multi-relational embedding. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2258–2268.
- Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR abs/1906.04214 (2019). arXiv:1906.04214 http://arxiv.org/abs/1906.04214
- Betweenness Approximation for Hypernetwork Dismantling with Hypergraph Neural Network. https://doi.org/10.48550/ARXIV.2203.03958
- GNNExplainer: Generating Explanations for Graph Neural Networks. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d’Alché-Buc, Emily B. Fox, and Roman Garnett (Eds.). 9240–9251. https://proceedings.neurips.cc/paper/2019/hash/d80b7040b773199015de6d3b4293c8ff-Abstract.html
- XGNN: Towards Model-Level Explanations of Graph Neural Networks. CoRR abs/2006.02587 (2020). arXiv:2006.02587 https://arxiv.org/abs/2006.02587
- On Explainability of Graph Neural Networks via Subgraph Explorations. CoRR abs/2102.05152 (2021). arXiv:2102.05152 https://arxiv.org/abs/2102.05152
- Network dynamic GCN influence maximization algorithm with leader fake labeling mechanism. IEEE Transactions on Computational Social Systems (2022).
- Jiazheng Zhang and Bang Wang. 2022. Dismantling Complex Networks by a Neural Model Trained from Tiny Networks. In Proceedings of the 31st ACM International Conference on Information Knowledge Management. ACM. https://doi.org/10.1145/3511808.3557290
- Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation. In Proceedings of the ACM Web Conference 2022. ACM. https://doi.org/10.1145/3485447.3512179
- Dimensional reweighting graph convolutional networks. arXiv preprint arXiv:1907.02237 (2019).
- TDGIA: Effective Injection Attacks on Graph Neural Networks. CoRR abs/2106.06663 (2021). arXiv:2106.06663 https://arxiv.org/abs/2106.06663
- Adversarial Attacks on Graph Neural Networks: Perturbations and Their Patterns. ACM Trans. Knowl. Discov. Data 14, 5, Article 57 (jun 2020), 31 pages. https://doi.org/10.1145/3394520
- Daniel Zügner and Stephan Günnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. CoRR abs/1902.08412 (2019). arXiv:1902.08412 http://arxiv.org/abs/1902.08412
- Adversarial Attacks on Neural Networks for Graph Data. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM. https://doi.org/10.1145/3219819.3220078