Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/118324
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.creatorZhu, Yen_US
dc.creatorLai, Yen_US
dc.creatorZhao, Ken_US
dc.creatorLuo, Xen_US
dc.creatorYuan, Men_US
dc.creatorWu, Jen_US
dc.creatorRen, Jen_US
dc.creatorZhou, Ken_US
dc.date.accessioned2026-04-02T02:34:26Z-
dc.date.available2026-04-02T02:34:26Z-
dc.identifier.issn2162-237Xen_US
dc.identifier.urihttp://hdl.handle.net/10397/118324-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights© 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication Y. Zhu et al., 'From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection,' in IEEE Transactions on Neural Networks and Learning Systems, vol. 36, no. 4, pp. 6174-6187, April 2025 is available at https://doi.org/10.1109/TNNLS.2024.3400395.en_US
dc.subjectAdversarial graph analysisen_US
dc.subjectDiscrete optimizationen_US
dc.subjectGraph anomaly detection (GAD)en_US
dc.subjectGraph neural networksen_US
dc.subjectStructural poisoning attacken_US
dc.titleFrom bi-level to one-level : a framework for structural attacks to graph anomaly detectionen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage6174en_US
dc.identifier.epage6187en_US
dc.identifier.volume36en_US
dc.identifier.issue4en_US
dc.identifier.doi10.1109/TNNLS.2024.3400395en_US
dcterms.abstractThe success of graph neural networks stimulates the prosperity of graph mining and the corresponding downstream tasks including graph anomaly detection (GAD). However, it has been explored that those graph mining methods are vulnerable to structural manipulations on relational data. That is, the attacker can maliciously perturb the graph structures to assist the target nodes in evading anomaly detection. In this article, we explore the structural vulnerability of two typical GAD systems: unsupervised FeXtra-based GAD and supervised graph convolutional network (GCN)-based GAD. Specifically, structural poisoning attacks against GAD are formulated as complex bi-level optimization problems. Our first major contribution is then to transform the bi-level problem into one-level leveraging different regression methods. Furthermore, we propose a new way of utilizing gradient information to optimize the one-level optimization problem in the discrete domain. Comprehensive experiments demonstrate the effectiveness of our proposed attack algorithm BinarizedAttack.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE transactions on neural networks and learning systems, Apr. 2025, v. 36, no. 4, p. 6174-6187en_US
dcterms.isPartOfIEEE transactions on neural networks and learning systemsen_US
dcterms.issued2025-04-
dc.identifier.scopus2-s2.0-105002394450-
dc.identifier.pmid38771690-
dc.identifier.eissn2162-2388en_US
dc.description.validate202604 bcjzen_US
dc.description.oaAccepted Manuscripten_US
dc.identifier.SubFormIDG001345/2025-12-
dc.description.fundingSourceRGCen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextThis work was supported in part by the National Science Foundation of China under Grant 62106210 and Grant U21B2019 and in part by Hong Kong Research Grants Council under Grant PolyU25210821 and Grant PolyU15222320.en_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Zhu_Bi-level_One-level_Framework.pdfPre-Published version1.05 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

SCOPUSTM   
Citations

4
Citations as of May 8, 2026

WEB OF SCIENCETM
Citations

4
Citations as of Apr 23, 2026

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.