Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessOpenAI, Anthropic eye new AI safety solution - News.azGoogle News: AI SafetyChatGPT comes to CarPlay with iOS 26.4, supports voice-only interaction - The Times of IndiaGoogle News: ChatGPTFair decisions, clear reasons: Creating Fuzzy AI with fairness built in from the start - Asia Research News |Google News: Machine LearningWhy Vera cofounder Yaniv Bernstein was surprised when he said he was giving up AI - Startup DailyGoogle News: Machine LearningReact Native Background Task Processing Methods (2026)DEV CommunityFlutter AI Virtual Try-On: 6-Week Build, Zero BSDEV CommunityHow to Choose the Best Speech-to-text API for Voice AgentsHackernoon AIDetecting Bots in 2026: IP Intelligence + Email Validation in One API CallDEV CommunityExtremism Researchers Pivot to AI Industry’s Trust and Safety Gaps - Startup FortuneGoogle News: AI SafetyI built 2 free web tools to solve problems that annoyed me — here's what I learnedDEV CommunityHow to Build Production Ready AgentScope Workflows with ReAct Agents, Custom Tools, Multi-Agent Debate, Structured Output and Concurrent PipelinesMarkTechPost🌐 Beyond One Data Source: Building Scalable Data Pipelines in Power BIDEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessOpenAI, Anthropic eye new AI safety solution - News.azGoogle News: AI SafetyChatGPT comes to CarPlay with iOS 26.4, supports voice-only interaction - The Times of IndiaGoogle News: ChatGPTFair decisions, clear reasons: Creating Fuzzy AI with fairness built in from the start - Asia Research News |Google News: Machine LearningWhy Vera cofounder Yaniv Bernstein was surprised when he said he was giving up AI - Startup DailyGoogle News: Machine LearningReact Native Background Task Processing Methods (2026)DEV CommunityFlutter AI Virtual Try-On: 6-Week Build, Zero BSDEV CommunityHow to Choose the Best Speech-to-text API for Voice AgentsHackernoon AIDetecting Bots in 2026: IP Intelligence + Email Validation in One API CallDEV CommunityExtremism Researchers Pivot to AI Industry’s Trust and Safety Gaps - Startup FortuneGoogle News: AI SafetyI built 2 free web tools to solve problems that annoyed me — here's what I learnedDEV CommunityHow to Build Production Ready AgentScope Workflows with ReAct Agents, Custom Tools, Multi-Agent Debate, Structured Output and Concurrent PipelinesMarkTechPost🌐 Beyond One Data Source: Building Scalable Data Pipelines in Power BIDEV Community

PEANUT: Perturbations by Eigenvalue Alignment for Attacking GNNs Under Topology-Driven Message Passing

arXivMarch 30, 202610 min read0 views
Source Quiz

arXiv:2603.26136v1 Announce Type: new Abstract: Graph Neural Networks (GNNs) have achieved remarkable performance on tasks involving relational data. However, small perturbations to the graph structure can significantly alter GNN outputs, raising concerns about their robustness in real-world deployments. In this work, we explore the core vulnerability of GNNs which explicitly consume graph topology in the form of the adjacency matrix or Laplacian as a means for message passing, and propose PEANUT, a simple, gradient-free, restricted black-box attack that injects virtual nodes to capitalize on — Bhavya Kohli, Biplab Sikdar

View PDF HTML (experimental)

Abstract:Graph Neural Networks (GNNs) have achieved remarkable performance on tasks involving relational data. However, small perturbations to the graph structure can significantly alter GNN outputs, raising concerns about their robustness in real-world deployments. In this work, we explore the core vulnerability of GNNs which explicitly consume graph topology in the form of the adjacency matrix or Laplacian as a means for message passing, and propose PEANUT, a simple, gradient-free, restricted black-box attack that injects virtual nodes to capitalize on this vulnerability. PEANUT is a injection based attack, which is widely considered to be more practical and realistic scenario than graph modification attacks, where the attacker is able to modify the original graph structure directly. Our method works at the inference phase, making it an evasion attack, and is applicable almost immediately, since it does not involve lengthy iterative optimizations or parameter learning, which add computational and time overhead, or training surrogate models, which are susceptible to failure due to differences in model priors and generalization capabilities. PEANUT also does not require any features on the injected node and consequently demonstrates that GNN performance can be significantly deteriorated even with injected nodes with zeros for features, highlighting the significance of effectively designed connectivity in such attacks. Extensive experiments on real-world datasets across three graph tasks demonstrate the effectiveness of our attack despite its simplicity.

Comments: This work is a preprint. 8 content pages, 12 total pages including references

Subjects:

Machine Learning (cs.LG)

Cite as: arXiv:2603.26136 [cs.LG]

(or arXiv:2603.26136v2 [cs.LG] for this version)

https://doi.org/10.48550/arXiv.2603.26136

arXiv-issued DOI via DataCite

Submission history

From: Bhavya Kohli [view email] [v1] Fri, 27 Mar 2026 07:40:10 UTC (276 KB) [v2] Mon, 30 Mar 2026 08:17:10 UTC (276 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
PEANUT: Per…researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 238 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers