Skip to main content

Table 7 Results of direct attacks against each classifier with the PolBlogs dataset, with attacker budgets of 5, 10, and 20 edge perturbations

From: Complex network effects on the robustness of graph convolutional networks

  

Budget 5

Budget 10

Budget 20

Defense

Training

Net

FGA

IG

Net

FGA

IG

Net

FGA

IG

Jaccard

Rand.

0.672

0.616

0.688

0.896

0.848

0.856

0.992

0.968

0.976

Jaccard

SD

0.752

0.8

0.808

0.936

0.928

0.952

1.0

0.984

1.0

Jaccard

GC

0.768

0.76

0.872

0.904

0.92

0.976

0.992

1.0

1.0

RGCN

Rand.

0.48

0.464

0.312

0.632

0.664

0.504

0.784

0.872

0.704

RGCN

SD

0.304

0.28

0.344

0.4

0.44

0.52

0.648

0.568

0.736

RGCN

GC

0.56

0.488

0.336

0.72

0.648

0.456

0.832

0.832

0.64

Cheb

Rand.

0.376

0.352

0.448

0.536

0.552

0.544

0.72

0.68

0.744

Cheb

SD

0.408

0.376

0.432

0.624

0.544

0.584

0.784

0.688

0.768

Cheb

GC

0.576

0.424

0.472

0.68

0.568

0.592

0.8

0.728

0.768

SVD

Rand.

0.184

0.056

0.336

0.368

0.104

0.552

0.496

0.192

0.704

SVD

SD

0.288

0.016

0.368

0.416

0.024

0.536

0.496

0.064

0.808

SVD

GC

0.12

0.04

0.32

0.36

0.04

0.512

0.464

0.048

0.768

GAT

Rand.

0.456

0.52

0.376

0.624

0.792

0.52

0.824

0.912

0.672

GAT

SD

0.32

0.24

0.36

0.464

0.384

0.504

0.664

0.648

0.752

GAT

GC

0.552

0.528

0.336

0.744

0.84

0.576

0.856

0.936

0.84

GCN

Rand.

0.472

0.624

0.408

0.68

0.784

0.52

0.816

0.92

0.76

GCN

SD

0.424

0.344

0.408

0.568

0.528

0.544

0.76

0.76

0.672

GCN

GC

0.496

0.552

0.312

0.72

0.768

0.512

0.88

0.912

0.728

SGC

Rand.

0.36

N/A

N/A

0.464

N/A

N/A

0.6

N/A

N/A

SGC

SD

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

N/A

SGC

GC

0.528

N/A

N/A

0.736

N/A

N/A

0.856

N/A

N/A

  1. Results are included for Nettack (Net), FGA, and IG-FGSM (IG). For each classifier, we train with random (Rand.), StratDegree (SD), and GreedyCover (GC). Each entry is a probability of attack success, thus higher is better for the attacker and lower is better for the defender. To yield the most robust classifier, the defender picks the classifier/training method combination that minimizes the worst-case attack probability. These entries are listed in bold. Entries representing the most robust case for random training are in italic. Entries listed as N/A did not finish in the allotted time (24 h per trial). The best-performing cases for attacks with 10 or 20 perturbations use random sampling with an SGC classifier, though in these cases FGA and IG-FGSM were unavailable to the attacker. (If we only consider Nettack, SVD with GreedyCover consistently performs best.)