Cross-Paradigm Graph Backdoor Attacks with Promptable Subgraph Triggers
By: Dongyi Liu , Jiangtong Li , Dawei Cheng and more
Potential Business Impact:
Makes computer attacks work on different systems.
Graph Neural Networks(GNNs) are vulnerable to backdoor attacks, where adversaries implant malicious triggers to manipulate model predictions. Existing trigger generators are often simplistic in structure and overly reliant on specific features, confining them to a single graph learning paradigm, such as graph supervised learning, graph contrastive learning, or graph prompt learning. This specialized design, which aligns the trigger with one learning objective, results in poor transferability when applied to other learning paradigms. For instance, triggers generated for the graph supervised learning paradigm perform poorly when tested within graph contrastive learning or graph prompt learning environments. Furthermore, these simple generators often fail to utilize complex structural information or node diversity within the graph data. These constraints limit the attack success rates of such methods in general testing scenarios. Therefore, to address these limitations, we propose Cross-Paradigm Graph Backdoor Attacks with Promptable Subgraph Triggers(CP-GBA), a new transferable graph backdoor attack that employs graph prompt learning(GPL) to train a set of universal subgraph triggers. First, we distill a compact yet expressive trigger set from target graphs, which is structured as a queryable repository, by jointly enforcing class-awareness, feature richness, and structural fidelity. Second, we conduct the first exploration of the theoretical transferability of GPL to train these triggers under prompt-based objectives, enabling effective generalization to diverse and unseen test-time paradigms. Extensive experiments across multiple real-world datasets and defense scenarios show that CP-GBA achieves state-of-the-art attack success rates.
Similar Papers
Stealthy Yet Effective: Distribution-Preserving Backdoor Attacks on Graph Classification
Machine Learning (CS)
Hides secret messages in computer networks.
Towards Effective, Stealthy, and Persistent Backdoor Attacks Targeting Graph Foundation Models
Cryptography and Security
Makes smart computer graphs secretly do wrong things.
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Machine Learning (CS)
Makes computer networks easier to trick.