Skip to main content

Showing 1–5 of 5 results for author: Lukyanov, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.03424  [pdf, other

    cs.LG cs.AI

    Framework GNN-AID: Graph Neural Network Analysis Interpretation and Defense

    Authors: Kirill Lukyanov, Mikhail Drobyshevskiy, Georgii Sazonov, Mikhail Soloviov, Ilya Makarov

    Abstract: The growing need for Trusted AI (TAI) highlights the importance of interpretability and robustness in machine learning models. However, many existing tools overlook graph data and rarely combine these two aspects into a single solution. Graph Neural Networks (GNNs) have become a popular approach, achieving top results across various tasks. We introduce GNN-AID (Graph Neural Network Analysis, Inter… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

  2. arXiv:2505.02566  [pdf, ps, other

    cs.LG cs.AI

    Robustness questions the interpretability of graph neural networks: what to do?

    Authors: Kirill Lukyanov, Georgii Sazonov, Serafim Boyarsky, Ilya Makarov

    Abstract: Graph Neural Networks (GNNs) have become a cornerstone in graph-based data analysis, with applications in diverse domains such as bioinformatics, social networks, and recommendation systems. However, the interplay between model interpretability and robustness remains poorly understood, especially under adversarial scenarios like poisoning and evasion attacks. This paper presents a comprehensive be… ▽ More

    Submitted 5 May, 2025; originally announced May 2025.

  3. arXiv:2410.15889  [pdf, other

    cs.LG cs.AI

    Model Mimic Attack: Knowledge Distillation for Provably Transferable Adversarial Examples

    Authors: Kirill Lukyanov, Andrew Perminov, Denis Turdakov, Mikhail Pautov

    Abstract: The vulnerability of artificial neural networks to adversarial perturbations in the black-box setting is widely studied in the literature. The majority of attack methods to construct these perturbations suffer from an impractically large number of queries required to find an adversarial example. In this work, we focus on knowledge distillation as an approach to conduct transfer-based black-box adv… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

  4. Graph Neural Network for Crawling Target Nodes in Social Networks

    Authors: Kirill Lukyanov, Mikhail Drobyshevskiy, Danil Shaikhelislamov, Denis Turdakov

    Abstract: Social networks crawling is in the focus of active research the last years. One of the challenging task is to collect target nodes in an initially unknown graph given a budget of crawling steps. Predicting a node property based on its partially known neighbourhood is at the heart of a successful crawler. In this paper we adopt graph neural networks for this purpose and show they are competitive to… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    ACM Class: I.2.6

    Journal ref: 2022 Ivannikov Ispras Open Conference (ISPRAS), 2022, pp. 31-36

  5. arXiv:2403.13502  [pdf, other

    cs.LG cs.CR eess.SY

    Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process

    Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov

    Abstract: Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the threats in deploying deep learning models for fault diagnosis in ACS using the Tennessee Eastman Proces… ▽ More

    Submitted 7 June, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

    ACM Class: I.2.6; I.2.1

    Journal ref: IEEE Open Journal of the Industrial Electronics Society, 5 (2024) 428-440