Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
80 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
7 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Untargeted Adversarial Attack on Knowledge Graph Embeddings (2405.10970v1)

Published 8 May 2024 in cs.LG, cs.AI, and cs.CR

Abstract: Knowledge graph embedding (KGE) methods have achieved great success in handling various knowledge graph (KG) downstream tasks. However, KGE methods may learn biased representations on low-quality KGs that are prevalent in the real world. Some recent studies propose adversarial attacks to investigate the vulnerabilities of KGE methods, but their attackers are target-oriented with the KGE method and the target triples to predict are given in advance, which lacks practicability. In this work, we explore untargeted attacks with the aim of reducing the global performances of KGE methods over a set of unknown test triples and conducting systematic analyses on KGE robustness. Considering logic rules can effectively summarize the global structure of a KG, we develop rule-based attack strategies to enhance the attack efficiency. In particular,we consider adversarial deletion which learns rules, applying the rules to score triple importance and delete important triples, and adversarial addition which corrupts the learned rules and applies them for negative triples as perturbations. Extensive experiments on two datasets over three representative classes of KGE methods demonstrate the effectiveness of our proposed untargeted attacks in diminishing the link prediction results. And we also find that different KGE methods exhibit different robustness to untargeted attacks. For example, the robustness of methods engaged with graph neural networks and logic rules depends on the density of the graph. But rule-based methods like NCRL are easily affected by adversarial addition attacks to capture negative rules

Definition Search Book Streamline Icon: https://streamlinehq.com
References (42)
  1. Stealthy Targeted Data Poisoning Attack on Knowledge Graphs. In 2021 IEEE 37th International Conference on Data Engineering (ICDE). 2069–2074. https://doi.org/10.1109/ICDE51399.2021.00202
  2. Adversarial explanations for knowledge graph embeddings. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22. 2820–2826.
  3. Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, EMNLP 2021, Virtual Event / Punta Cana, Dominican Republic, 7-11 November, 2021. Association for Computational Linguistics, 8225–8239. https://doi.org/10.18653/V1/2021.EMNLP-MAIN.648
  4. Poisoning Knowledge Graph Embeddings via Relation Inference Patterns. In Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL/IJCNLP 2021, (Volume 1: Long Papers), Virtual Event, August 1-6, 2021. Association for Computational Linguistics, 1875–1888. https://doi.org/10.18653/V1/2021.ACL-LONG.147
  5. Translating Embeddings for Modeling Multi-relational Data. In Advances in Neural Information Processing Systems (NIPS).
  6. Neural Compositional Rule Learning for Knowledge Graph Reasoning. In The Eleventh International Conference on Learning Representations.
  7. Entity query feature expansion using knowledge base links. In Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval (Gold Coast, Queensland, Australia) (SIGIR ’14). Association for Computing Machinery, New York, NY, USA, 365–374. https://doi.org/10.1145/2600428.2609628
  8. Convolutional 2d knowledge graph embeddings. Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) (2018).
  9. Utilizing Knowledge Graphs for Text-Centric Information Retrieval. In The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval (Ann Arbor, MI, USA) (SIGIR ’18). Association for Computing Machinery, New York, NY, USA, 1387–1390. https://doi.org/10.1145/3209978.3210187
  10. Fairness-Aware Explainable Recommendation over Knowledge Graphs. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (Virtual Event, China) (SIGIR ’20). Association for Computing Machinery, New York, NY, USA, 69–78. https://doi.org/10.1145/3397271.3401051
  11. LinE: Logical Query Reasoning over Hierarchical Knowledge Graphs. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (Washington DC, USA) (KDD ’22). Association for Computing Machinery, New York, NY, USA, 615–625. https://doi.org/10.1145/3534678.3539338
  12. The SEPSES knowledge graph: An integrated resource for cybersecurity. In International Semantic Web Conference. Springer, 198–214.
  13. TECHS: Temporal Logical Graph Networks for Explainable Extrapolation Reasoning. In Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics, 1281–1293.
  14. Incorporating Context Graph with Logical Reasoning for Inductive Relation Prediction. In Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval (Madrid, Spain) (SIGIR ’22). Association for Computing Machinery, New York, NY, USA, 893–903. https://doi.org/10.1145/3477495.3531996
  15. Answering Complex Questions by Joining Multi-Document Evidence with Quasi Knowledge Graphs. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (Paris, France) (SIGIR’19). Association for Computing Machinery, New York, NY, USA, 105–114. https://doi.org/10.1145/3331184.3331252
  16. Graph Adversarial Attack via Rewiring. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (Virtual Event, Singapore) (KDD ’21). Association for Computing Machinery, New York, NY, USA, 1161–1169. https://doi.org/10.1145/3447548.3467416
  17. A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (Virtual Event, Republic of Korea) (CCS ’21). Association for Computing Machinery, New York, NY, USA, 108–125. https://doi.org/10.1145/3460120.3484796
  18. DOZEN: Cross-Domain Zero Shot Named Entity Recognition with Knowledge Graph. In Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval (Virtual Event, Canada) (SIGIR ’21). Association for Computing Machinery, New York, NY, USA, 1642–1646. https://doi.org/10.1145/3404835.3463113
  19. Investigating Robustness and Interpretability of Link Prediction via Adversarial Modifications. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). Association for Computational Linguistics, Minneapolis, Minnesota, 3336–3347.
  20. RNNLogic: Learning Logic Rules for Reasoning on Knowledge Graphs. In International Conference on Learning Representations.
  21. Improving Multi-hop Question Answering over Knowledge Graphs using Knowledge Base Embeddings. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 4498–4507.
  22. Modeling Relational Data with Graph Convolutional Networks. In The Semantic Web. Springer International Publishing, Cham, 593–607.
  23. Leslie F Sikos. 2023. Cybersecurity knowledge graphs. Knowledge and Information Systems (2023), 1–21.
  24. RotatE: Knowledge Graph Embedding by Relational Rotation in Complex Space. In International Conference on Learning Representations (ICLR).
  25. Representing Text for Joint Embedding of Text and Knowledge Bases. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Lisbon, Portugal, 1499–1509.
  26. Complex Embeddings for Simple Link Prediction. In Proceedings of The 33rd International Conference on Machine Learning (ICML). 2071–2080.
  27. Composition-based Multi-Relational Graph Convolutional Networks. In International Conference on Learning Representations.
  28. Denny Vrandečić and Markus Krötzsch. 2014. Wikidata: a free collaborative knowledgebase. Commun. ACM 57, 10 (2014), 78–85.
  29. Knowledge Base Completion Using Embeddings and Rules. In Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015. 1859–1866.
  30. Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. Cybersecurity 4 (2021), 1–21.
  31. Rule Learning over Knowledge Graphs: A Review. Transactions on Graph Data and Knowledge 1, 1 (2023), 7:1–7:23.
  32. Reinforcement Knowledge Graph Reasoning for Explainable Recommendation. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (Paris, France) (SIGIR’19). Association for Computing Machinery, New York, NY, USA, 285–294. https://doi.org/10.1145/3331184.3331203
  33. Embedding Entities and Relations for Learning and Inference in Knowledge Bases. International Conference on Learning Representations (ICLR) (2015).
  34. Differentiable Learning of Logical Rules for Knowledge Base Reasoning. In Proceedings of the 31st International Conference on Neural Information Processing Systems (Long Beach, California, USA) (NIPS’17). Curran Associates Inc., Red Hook, NY, USA, 2316–2325.
  35. MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding. In Proceedings of the ACM Web Conference 2023 (Austin, TX, USA) (WWW ’23). Association for Computing Machinery, New York, NY, USA, 2000–2010. https://doi.org/10.1145/3543507.3583203
  36. A relationship extraction method for domain knowledge graph construction. World Wide Web 23 (2020), 735–753.
  37. Data Poisoning Attack against Knowledge Graph Embedding. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19. International Joint Conferences on Artificial Intelligence Organization, 4853–4859.
  38. Knowledge graph reasoning with logics and embeddings: survey and perspective. arXiv preprint arXiv:2202.07412 (2022).
  39. Iteratively Learning Embeddings and Rules for Knowledge Graph Reasoning. In The World Wide Web Conference (San Francisco, CA, USA) (WWW ’19). Association for Computing Machinery, New York, NY, USA, 2366–2377. https://doi.org/10.1145/3308558.3313612
  40. PRGC: Potential Relation and Global Correspondence Based Joint Relational Triple Extraction. In Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). Association for Computational Linguistics, 6225–6235.
  41. Recommending Learning Objects Through Attentive Heterogeneous Graph Convolution and Operation-Aware Neural Network. IEEE Trans. Knowl. Data Eng. 35, 4 (2023), 4178–4189.
  42. Adversarial Attacks on Neural Networks for Graph Data. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (London, United Kingdom) (KDD ’18). Association for Computing Machinery, New York, NY, USA, 2847–2856. https://doi.org/10.1145/3219819.3220078
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Tianzhe Zhao (7 papers)
  2. Jiaoyan Chen (85 papers)
  3. Yanchi Ru (1 paper)
  4. Qika Lin (24 papers)
  5. Yuxia Geng (22 papers)
  6. Jun Liu (606 papers)
Citations (1)
X Twitter Logo Streamline Icon: https://streamlinehq.com