Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessCommunity Without Tokens: What AI Dev Tools Can Learn from Crypto's Community PlaybookDev.to AIGarry Tan's gstack: Install This 56k-Star 'Virtual Team' for Claude CodeDev.to AIA Step-by-Step Guide to K-Nearest Neighbors (KNN) in Machine LearningDev.to AIOil prices extend gains after record monthly rally as Iran war fuels supply worriesCNBC TechnologyWhy Your "AI Assistant" is Obsolete: Welcoming the Era of Agentic Workflows & MCPDev.to AIBig Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.Dev.to AIHow to Create Viral Videos with AI in 2026Dev.to AIEmbers of Autoregression: Understanding Large Language Models Through theProblem They are Trained to SolveDev.to AIBuilding the Payment Gateway for AI Agents: A Technical Deep DiveDev.to AIOpenClaw is incredible until you deploy it wrongDev.to AIWhy Most Frontend Apps Are Smarter Than Their Engineers RealizeDev.to AIThis Isn’t Another ‘AI Productivity Hack’ ArticleMedium AIBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessCommunity Without Tokens: What AI Dev Tools Can Learn from Crypto's Community PlaybookDev.to AIGarry Tan's gstack: Install This 56k-Star 'Virtual Team' for Claude CodeDev.to AIA Step-by-Step Guide to K-Nearest Neighbors (KNN) in Machine LearningDev.to AIOil prices extend gains after record monthly rally as Iran war fuels supply worriesCNBC TechnologyWhy Your "AI Assistant" is Obsolete: Welcoming the Era of Agentic Workflows & MCPDev.to AIBig Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.Dev.to AIHow to Create Viral Videos with AI in 2026Dev.to AIEmbers of Autoregression: Understanding Large Language Models Through theProblem They are Trained to SolveDev.to AIBuilding the Payment Gateway for AI Agents: A Technical Deep DiveDev.to AIOpenClaw is incredible until you deploy it wrongDev.to AIWhy Most Frontend Apps Are Smarter Than Their Engineers RealizeDev.to AIThis Isn’t Another ‘AI Productivity Hack’ ArticleMedium AI

Are LLM-Enhanced Graph Neural Networks Robust against Poisoning Attacks?

arXivMarch 30, 202610 min read0 views
Source Quiz

arXiv:2603.26105v1 Announce Type: new Abstract: Large Language Models (LLMs) have advanced Graph Neural Networks (GNNs) by enriching node representations with semantic features, giving rise to LLM-enhanced GNNs that achieve notable performance gains. However, the robustness of these models against poisoning attacks, which manipulate both graph structures and textual attributes during training, remains unexplored. To bridge this gap, we propose a robustness assessment framework that systematically evaluates LLM-enhanced GNNs under poisoning attacks. Our framework enables comprehensive evaluatio — Yuhang Ma, Jie Wang, Zheng Yan

View PDF HTML (experimental)

Abstract:Large Language Models (LLMs) have advanced Graph Neural Networks (GNNs) by enriching node representations with semantic features, giving rise to LLM-enhanced GNNs that achieve notable performance gains. However, the robustness of these models against poisoning attacks, which manipulate both graph structures and textual attributes during training, remains unexplored. To bridge this gap, we propose a robustness assessment framework that systematically evaluates LLM-enhanced GNNs under poisoning attacks. Our framework enables comprehensive evaluation across multiple dimensions. Specifically, we assess 24 victim models by combining eight LLM- or Language Model (LM)-based feature enhancers with three representative GNN backbones. To ensure diversity in attack coverage, we incorporate six structural poisoning attacks (both targeted and non-targeted) and three textual poisoning attacks operating at the character, word, and sentence levels. Furthermore, we employ four real-world datasets, including one released after the emergence of LLMs, to avoid potential ground truth leakage during LLM pretraining, thereby ensuring fair evaluation. Extensive experiments show that LLM-enhanced GNNs exhibit significantly higher accuracy and lower Relative Drop in Accuracy (RDA) than a shallow embedding-based baseline across various attack settings. Our in-depth analysis identifies key factors that contribute to this robustness, such as the effective encoding of structural and label information in node representations. Based on these insights, we outline future research directions from both offensive and defensive perspectives, and propose a new combined attack along with a graph purification defense. To support future research, we release the source code of our framework at~\url{this https URL}.

Comments: To appear at 2026 IEEE Symposium on Security and Privacy (SP)

Subjects:

Machine Learning (cs.LG)

Cite as: arXiv:2603.26105 [cs.LG]

(or arXiv:2603.26105v1 [cs.LG] for this version)

https://doi.org/10.48550/arXiv.2603.26105

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Jie Wang [view email] [v1] Fri, 27 Mar 2026 06:28:25 UTC (6,782 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Are LLM-Enh…researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 101 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers