Computer Science ›› 2022, Vol. 49 ›› Issue (12): 340-345.doi: 10.11896/jsjkx.220500185

• Information Security • Previous Articles     Next Articles

Graph Convolutional Network Adversarial Attack Method for Brain Disease Diagnosis

WANG Xiao-ming, WEN Xu-yun, XU Meng-ting, ZHANG Dao-qiang   

  1. College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211111,China
  • Received:2022-05-20 Revised:2022-08-27 Published:2022-12-14
  • About author:WANG Xiao-ming,born in 1999,master,is a member of China Association of Artificial Intelligence.His main research interests include brain functional connectivity networks analysis and machine learning.ZHANG Dao-qiang,born in 1978,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include machine learning,pattern recognition,data mi-ning and medical image analysis.
  • Supported by:
    National Natural Science Foundation of China(62136004,61876082,61732006) and Fundamental Research Funds for the Central Universities(3082020NZ2020018 ).

Abstract: In recent years,brain functional networks analysis using the resting state functional magnetic resonance imaging data has been widely used in computer-aided diagnosis tasks of various brain diseases.The graph convolutional network framework integrating clinical phenotypic measurements and brain functional networks improves the applicability of intelligent medical disease diagnosis models to the real world.However,the trustworthiness study is an important but still widely neglected component of disease diagnosis models based on brain functional networks.Adversarial attack techniques in medical machine learning can deceive models,which further leads to the security and trust issues of the model applied in clinical practice.Based on this,this paper proposes an adversarial attack method BFGCNattack on graph convolutional network for brain disease diagnosis,constructs a disease diagnosis model integrating clinical phenotypic measurements,and evaluates the robustness of brain functional networks-based disease diagnosis model in the face of adversarial attacks.Experimental results on the autism brain imaging data exchange dataset suggest that the models constructed using graph convolutional networks are vulnerable to the proposed adversarial attack.Even if only a small number(10%) of perturbations are performed,the model’s accuracy and classification margin significantly decrease,while the fooling rate significantly increases.

Key words: Adversarial attack method, Brain disease diagnosis, Graph convolutional network, Brain functional networks analysis, Model robustness

CLC Number: 

  • TP181
[1]FINN E S,ROSENBERG M D.Beyond fingerprinting:Choosing predictive connectomes over reliable connectomes[J].Neuro-Image,2021,239:118254.
[2]SHEN X L,FINN E S,SCHEINOST D,et al.Using connectome-based predictive modeling to predict individual behavior from brain connectivity[J].Nature Protocols,2017,12(3):506-518.
[3]SONG H,FINN E S,ROSENBERG M D.Neural signatures of attentional engagement during narratives and its consequences for event memory[C]//Proceedings of the National Academy of Sciences.2021.
[4]DU Y H,FU Z,CALHOUN V D.Classification and prediction of brain disorders using functional connectivity:promising but challenging[J/OL].https://www.frontiersin.org/articles/10.3389/fnins.2018.00525/full.
[5]ZHANG D Q,HUANG J S,JIE B,et al.Ordinal pattern:A new descriptor for brain connectivity networks[J].IEEE Transactions on Medical Imaging,2018,37(7):1711-1722.
[6]GAN J Z,PENG Z W,ZHU X F,et al.Brain functional connectivity analysis based on multi-graph fusion[J/OL].https://www.sciencedirect.com/science/article/abs/pii/S1361841521001031.
[7]BENKARIM O,PAQUOLA C,PARK B,et al.The cost of untracked diversity in brain-imaging prediction[J/OL]. https://www.biorxiv.org/content/10.1101/2021.06.16.448764v1.
[8]SZEGEDY C,ZAREMBA W,SUTSKEVER I,et al.Intriguing properties of neural networks[J].arXiv:1312.6199,2013.
[9]DEMONTIS A,MELIS M,BIGGIO B,et al.Yes,machine lear-ning can be more secure! a case study on android malware detection[J].IEEE Transactions on Dependable and Secure Computing,2017,16(4):711-724.
[10]GOODFELLOW I J,SHLENS J,SZEGEDY C.Explaining and harnessing adversarial examples[J].arXiv:1412.6572,2014.
[11]FINLAYSON S G,BOWERS J D,ITO J,et al.Adversarial attacks on medical machine learning[J].Science,2019,363(6433):1287-1289.
[12]DI MARTINO A,YAN C G,LI Q,et al.The autism brain imaging data exchange:towards a large-scale evaluation of the intrinsic brain architecture in autism[J].Molecular psychiatry,2014,19(6):659-667.
[13]SUN L C,DOU Y T,YANG C,et al.Adversarial attack and defense on graph data:A survey[J].arXiv:1812.10528,2018.
[14]XU K D,CHEN H G,LIU S J,et al.Topology attack and defense for graph neural networks:An optimization perspective[J].arXiv:1906.04214,2019.
[15]DOU Y T,MA G X,YU P S,et al.Robust spammer detection by nash reinforcement learning[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Disco-very & Data Mining.2020:924-933.
[16]WANG X Y,CHENG M H,EATON J,et al.Attack graph convolutional networks by adding fake nodes[J].arXiv:1810.10751,2018.
[17]ZÜGNER D,AKBARNEJAD A,GÜNNEMANN S.Adversarial attacks on neural networks for graph data[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.2018:2847-2856.
[18]CHEN J Y,CHEN L H,CHEN Y X,et al.GA-based Q-attack on community detection[J].IEEE Transactions on Computational Social Systems,2019,6(3):491-503.
[19]BOJCHEVSKI A,GÜNNEMANN S.Adversarial attacks onnode embeddings via graph poisoning[C]//InternationalConfe-rence on Machine Learning.PMLR,2019:695-704.
[20]CHEN Y Z,NADJI Y,KOUNTOURAS A,et al.Practical attacks against graph-based clustering[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.2017:1125-1142.
[21]FENG F L,HE X N,TANG J,et al.Graph adversarial training:Dynamically regularizing based on graph structure[J].IEEE Transactions on Knowledge and Data Engineering,2019,33(6):2493-2504.
[22]BETZEL R F,BASSETT D S.Multi-scale brain networks[J].Neuroimage,2017,160:73-83.
[23]GREICIUS M D,KRASNOW B,REISS A L,et al.Functional connectivity in the resting brain:a network analysis of the default mode hypothesis[C]//Proceedings of the National Academy of Sciences.2003:253-258.
[24]KTENA S I,PARISOT S,FERRANTE E,et al.Metric learning with spectral graph convolutions on brain connectivity networks[J].NeuroImage,2018,169:431-442.
[25]PARISOT S,KTENA S I,FERRANTE E,et al.Disease prediction using graph convolutional networks:application to autism spectrum disorder and Alzheimer’s disease[J].Medical Image Analysis,2018,48:117-130.
[26]DEFFERRARD M,BRESSON X,VANDERGHEYNST P.Convolutional neural networks on graphs with fast localized spectral filtering[J].Advances in Neural Information Processing Systems,2016,29:3844-3852.
[27]KIPF T N,WELLING M.Semi-supervised classification withgraph convolutional networks[J].arXiv:1609.02907,2016.
[1] TAN Ying-ying, WANG Jun-li, ZHANG Chao-bo. Review of Text Classification Methods Based on Graph Convolutional Network [J]. Computer Science, 2022, 49(8): 205-216.
[2] WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48.
[3] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[4] ZHAO Xiao-hu, YE Sheng, LI Xiao. Multi-algorithm Fusion Behavior Classification Method for Body Bone Information Reconstruction [J]. Computer Science, 2022, 49(6): 269-275.
[5] PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300.
[6] ZHOU Hai-yu, ZHANG Dao-qiang. Multi-site Hyper-graph Convolutional Neural Networks and Application [J]. Computer Science, 2022, 49(3): 129-133.
[7] ZHANG Bin, LIU Chang-hong, ZENG Sheng, JIE An-quan. Speech-driven Personal Style Gesture Generation Method Based on Spatio-Temporal GraphConvolutional Networks [J]. Computer Science, 2022, 49(11A): 210900094-5.
[8] XIAO Zheng-ye, LIN Shi-quan, WAN Xiu-an, FANGYu-chun, NI Lan. Temporal Relation Guided Knowledge Distillation for Continuous Sign Language Recognition [J]. Computer Science, 2022, 49(11): 156-162.
[9] ZHANG Wei-qi, TANG Yi-feng, LI Lin-yan, HU Fu-yuan. Image Stream From Paragraph Method Based on Scene Graph [J]. Computer Science, 2022, 49(1): 233-240.
[10] SONG Long-ze, WAN Huai-yu, GUO Sheng-nan, LIN You-fang. Multi-task Spatial-Temporal Graph Convolutional Network for Taxi Idle Time Prediction [J]. Computer Science, 2021, 48(7): 112-117.
[11] LYU Ming-qi, HONG Zhao-xiong, CHEN Tie-ming. Traffic Flow Forecasting Method Combining Spatio-Temporal Correlations and Social Events [J]. Computer Science, 2021, 48(2): 264-270.
[12] JIANG Zong-li, LI Miao-miao, ZHANG Jin-li. Graph Convolution of Fusion Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2020, 47(7): 231-235.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!