PEANUT: Perturbations by Eigenvalue Alignment for Attacking GNNs Under Topology-Driven Message Passing
arXiv:2603.26136v1 Announce Type: new Abstract: Graph Neural Networks (GNNs) have achieved remarkable performance on tasks involving relational data. However, small perturbations to the graph structure can significantly alter GNN outputs, raising concerns about their robustness in real-world deployments. In this work, we explore the core vulnerability of GNNs which explicitly consume graph topology in the form of the adjacency matrix or Laplacian as a means for message passing, and propose PEANUT, a simple, gradient-free, restricted black-box attack that injects virtual nodes to capitalize on — Bhavya Kohli, Biplab Sikdar
View PDF HTML (experimental)
Abstract:Graph Neural Networks (GNNs) have achieved remarkable performance on tasks involving relational data. However, small perturbations to the graph structure can significantly alter GNN outputs, raising concerns about their robustness in real-world deployments. In this work, we explore the core vulnerability of GNNs which explicitly consume graph topology in the form of the adjacency matrix or Laplacian as a means for message passing, and propose PEANUT, a simple, gradient-free, restricted black-box attack that injects virtual nodes to capitalize on this vulnerability. PEANUT is a injection based attack, which is widely considered to be more practical and realistic scenario than graph modification attacks, where the attacker is able to modify the original graph structure directly. Our method works at the inference phase, making it an evasion attack, and is applicable almost immediately, since it does not involve lengthy iterative optimizations or parameter learning, which add computational and time overhead, or training surrogate models, which are susceptible to failure due to differences in model priors and generalization capabilities. PEANUT also does not require any features on the injected node and consequently demonstrates that GNN performance can be significantly deteriorated even with injected nodes with zeros for features, highlighting the significance of effectively designed connectivity in such attacks. Extensive experiments on real-world datasets across three graph tasks demonstrate the effectiveness of our attack despite its simplicity.
Comments: This work is a preprint. 8 content pages, 12 total pages including references
Subjects:
Machine Learning (cs.LG)
Cite as: arXiv:2603.26136 [cs.LG]
(or arXiv:2603.26136v2 [cs.LG] for this version)
https://doi.org/10.48550/arXiv.2603.26136
arXiv-issued DOI via DataCite
Submission history
From: Bhavya Kohli [view email] [v1] Fri, 27 Mar 2026 07:40:10 UTC (276 KB) [v2] Mon, 30 Mar 2026 08:17:10 UTC (276 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
researchpaperarxivExtremism Researchers Pivot to AI Industry’s Trust and Safety Gaps - Startup Fortune
<a href="https://news.google.com/rss/articles/CBMimAFBVV95cUxOVjhVWEgxd2NGRlByWm50dzRDVDFYbDh3SHRJNHdsZVFrMGc5YV9zZlRIQWU5NWo2MzBZSVVxWDhoZG03RTctVmszRllsdVJNU2lvWnlwUVZfNXp2bkZXMjRoQ2I4RzYxRzduSWVFd0JyZ0lCM0pVOWtETjVRLWE0Q2RwbVp0SlQ2Y2hteEVFTEZfc3N1T1ZBTA?oc=5" target="_blank">Extremism Researchers Pivot to AI Industry’s Trust and Safety Gaps</a> <font color="#6f6f6f">Startup Fortune</font>
Fair decisions, clear reasons: Creating Fuzzy AI with fairness built in from the start - Asia Research News |
<a href="https://news.google.com/rss/articles/CBMirAFBVV95cUxOS2ZFSlhpUDZueldBUXpTQ1MtZ3QwX0l1bjhsQzAxRjF1ZnhQOHNDcTA4VzM0a3FKQ0pSRUY3Q2JCa3lVTnBxU29jLU5Gd2Rnb2stQmxnSl95MDNVZGlCSHVJZVFfQWp1azR3UnNOU3pkZjlXTW1ESTU4V0lMdy1RbFRLUC10anpoUUpwZ0dKc2E2VVdvUDBCb2tQbHRLSTNrcW8zMHJiMGdmNHJC?oc=5" target="_blank">Fair decisions, clear reasons: Creating Fuzzy AI with fairness built in from the start</a> <font color="#6f6f6f">Asia Research News |</font>
ANU partners with AI safety company Anthropic to strengthen its AI research and teaching - anu.edu.au
<a href="https://news.google.com/rss/articles/CBMiwwFBVV95cUxQd1FoSHltem1yYjdFNzJGRFZtY0lOLXpnOVRiMzZENEdXZVRDYV9JQVRFbnNwdVB3QU5tYm4tWDF5V3YzYkIwYTdNYThVUjdRcjNoTmRQZWs4SWM0d1BZMi1VdEdHTG1xVWhrTkx4YzRrckVGZDFtRVdDdDVPSGFiQnBPR0tycHZrR0VSUndzODlFRi1STFM2R0NlN2RsbUo5Y3l1NzhlZmxvWXA0NHpNVDBYeGxwT0lJWFpvaUxUNDJma0U?oc=5" target="_blank">ANU partners with AI safety company Anthropic to strengthen its AI research and teaching</a> <font color="#6f6f6f">anu.edu.au</font>
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers

Beyond Symbolic Solving: Multi Chain-of-Thought Voting for Geometric Reasoning in Large Language Models
arXiv:2604.00890v1 Announce Type: new Abstract: Geometric Problem Solving (GPS) remains at the heart of enhancing mathematical reasoning in large language models because it requires the combination of diagrammatic understanding, symbolic manipulation and logical inference. In existing literature, researchers have chiefly focused on synchronising the diagram descriptions with text literals and solving the problem. In this vein, they have either taken a neural, symbolic or neuro-symbolic approach. But this solves only the first two of the requirements, namely diagrammatic understanding and symbolic manipulation, while leaving logical inference underdeveloped. The logical inference is often limited to one chain-of-thought (CoT). To address this weakness in hitherto existing models, this paper

Google research suggests encryption technique used by Bitcoin will be cracked by quantum computers around 2029 — search giant says quantum attacks need to be prepared for now
Google research suggests encryption technique used by Bitcoin will be cracked by quantum computers around 2029 — search giant says quantum attacks need to be prepared for now

ARGS: Auto-Regressive Gaussian Splatting via Parallel Progressive Next-Scale Prediction
arXiv:2604.00494v1 Announce Type: new Abstract: Auto-regressive frameworks for next-scale prediction of 2D images have demonstrated strong potential for producing diverse and sophisticated content by progressively refining a coarse input. However, extending this paradigm to 3D object generation remains largely unexplored. In this paper, we introduce auto-regressive Gaussian splatting (ARGS), a framework for making next-scale predictions in parallel for generation according to levels of detail. We propose a Gaussian simplification strategy and reverse the simplification to guide next-scale generation. Benefiting from the use of hierarchical trees, the generation process requires only \(\mathcal{O}(\log n)\) steps, where \(n\) is the number of points. Furthermore, we propose a tree-based tra

Benchmarking Filtered Approximate Nearest Neighbor Search Algorithms on Transformer-based Embedding Vectors
arXiv:2507.21989v3 Announce Type: replace-cross Abstract: Advances in embedding models for text, image, audio, and video drive progress across multiple domains, including retrieval-augmented generation, recommendation systems, and others. Many of these applications require an efficient method to retrieve items that are close to a given query in the embedding space while satisfying a filter condition based on the item's attributes, a problem known as filtered approximate nearest neighbor search (FANNS). By performing an in-depth literature analysis on FANNS, we identify a key gap in the research landscape: publicly available datasets with embedding vectors from state-of-the-art transformer-based text embedding models that contain abundant real-world attributes covering a broad spectrum of a
Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!