T-Attack: Toward Black-Box Adversarial Attacks on GNN-Based Trust Prediction in OSNs
Abstract
1. Introduction
- (1)
- We present an improved loss function where the target class is the trust level with the minimum probability in the prediction result of the surrogate model. Our proposed attack strategy manipulates user features related to network topology using neural networks. To ensure unnoticeable perturbations in user features, Euclidean distance and Cosine similarity are integrated as constraint terms in the loss function.
- (2)
- By introducing the prior knowledge of social trust propagation, the solution alters the trust rating of pairwise users to disrupt social trust chains, thereby amplifying the impact of attacks on social trust assessment models.
- (3)
- By combining user feature attacks with social trust relationship manipulation based on trust propagation, we design a black-box untargeted attack strategy, T-Attack, which undermines the performance of the target trust prediction model through transferable attack.
- (4)
- We evaluate the performance of our proposed attack strategy on both benchmark datasets, Pretty Good Privacy (PGP) and Advogato, through comprehensive experiments. Experimental results prove that our proposed attack strategy significantly worsens the result of trust assessment by migration attack, compared with other baselines.
2. Related Work
2.1. Adversarial Attacks on GNN
2.2. Trust Prediction Based on GNN
3. Background Knowledge and Problem Scope
3.1. Background Knowledge
3.1.1. Guardian
3.1.2. GATrust
3.1.3. TrustGNN
3.1.4. Trust Propagation and Aggregation
3.2. Problem Statement and Definition
4. Methodology
4.1. Sketch of Our Attack Strategy
4.2. Surrogate Model
4.2.1. GNN Layer
4.2.2. Prediction Layer
4.3. Attack Strategy
4.3.1. Feature Perturbation Attacks
4.3.2. Trust Relationship Attacks
4.4. Attack Strategy Implementation
| Algorithm 1 The overall attack strategy of T-Attack. |
|
- 1:
- Training the surrogate model: We treat OSNs with trust relationships as a signed graph. Then, we adopt the graph embedding technique to capture user features associated with network structure. The surrogate model is trained and used to assess the trust scores of between unobserved trust links by using user features and pre-existing trust relationships as inputs, as described in Section 4.2.
- 2:
- Feature perturbations attacks: We discover all trust ratings with the lowest probability from the surrogate model’s prediction outcome and regard it as the target label in the loss function. Subsequently, we design a user feature perturbation generator which is composed of a two-layer fully connected network. To generate unnoticeable perturbations, we use Euclidean distance and Cosine similarity as the constraint in the loss function. Using the loss function, we optimize the user feature perturbation generator to implement feature perturbation attacks in a subtle way.
- 3:
- Trust relationship attacks: We find all shortest trust chains between trustor–trustee pairs in the signed graph, using the BFS algorithm. Then, we manipulate the trust rating connected to the trustee in all shortest trust chains, where the manipulated trust ratings choose the trust classification label with the smallest probability in the prediction result of the surrogate model. Considering the existence of multiple shortest trust chains in a trustor–trustee pair, we compute the gradient of the surrogate model’s loss function when disrupting any trust chain in the trustor–trustee pair, as shown in Equation (25). We select the trust chain exhibiting the largest gradient as the crucial target for the attack.
- 4:
- Craft attack strategy: Finally, we train a user feature perturbation generator to produce adversarial samples using the training datasets. Targeted toward each trustor–trustee pair in the training set, we depend on gradient information to modify the trust ratings that are part of a shortest trust chain between a trustor–trustee pair. We utilize the user feature perturbation and the manipulated trust rating to modify the input of GNN-based trust prediction models, performing transfer attacks.
5. Experimental Results and Discussion
5.1. Experimental Set up
5.1.1. Datasets
- Advogato [14]: The dataset comes from an online community for software development. In this community, through a trust metric mechanism, evaluate the reputation and contribution of free software contributors and help users understand the experience and skills of developers. Furthermore, mutual evaluations of users’ software development capabilities essentially constitute social trust relationships on the network. The dataset consists of four types of trustworthiness.
- Pretty-Good-Privacy (PGP) [14]: The dataset is sourced from a public key authentication network based on the web-of-trust mechanism. This network is primarily used to secure the confidentiality of emails and documents. Consequently, an edge between users represents the act of one user authenticating the trustworthiness of another user in PGP. The trust ratings are classified into four specific levels just as in Advogato. Table 2 summarizes the statistics of both datasets. The aforementioned datasets are divided into two sections: the training set and the test set. To conduct an untargeted attack, we randomly sample of the pre-existing trust links and their associated users from this dataset to form the training set. We use the remaining of this dataset as the test set. Furthermore, we hypothesize that there are no social relationships among users in the test set to verify the untargeted attack performance of all attack strategies.
5.1.2. Victim Models
- Guardian is an innovative end-to-end framework that leverages Graph Convolutional Networks (GCNs) to learn latent factors in a trust relationship. The framework is subtly designed to integrate social network architectures and trust relationships, enabling the estimation of social trust in pairwise users.
- GATrust fuses heterogeneous information from multiple sources: user situation-aware information, network topology, and pre-existing trust links. Through the integration of graph attention networks and graph convolution networks, the framework is capable of learning multiple latent factors originating from heterogeneous information of users for pairwise users in OSNs, thereby constructing a social trust evaluation model.
- TrustGNN extracts trust-related embeddings along trust chains to explicitly model the propagative nature of social trust. Subsequently, the model leverages an attention mechanism to capture the composable nature of social trust for evaluating trust relationships between users.
5.1.3. Baseline Solutions for Comparison
- : An attacker randomly manipulates the trust rating between users in OSNs.
- [28]: An attacker utilizes meta-gradients to regard the graph structure as a hyperparameter and inject unnoticeable perturbation into the graph by adding or removing edges. To adapt to the trust prediction domain, attackers randomly assign trust levels to the edges added by Meta-Train.
- [31]: An attacker uses Gradient Debias to design a loss function for untargeted attacks on graphs, where unweighted gradients are generated for manipulating graph structures. In particular, these unweighted gradients are unaffected by the node confidence. Therefore, trust levels are also randomly assigned while the attacker adds edges in GNN-based trust prediction models.
- [21]: The attack strategy includes a node perturbation generator based on Nesterov Accelerated Gradient and leverages an edge rewiring operation (e.g., rewire trust relationship) to manipulate the graph structure to evade detection. Meanwhile, the trust rating of the rewiring edge is also set randomly.
5.1.4. Metrics and Parameter Setting
5.2. The Performance of the Surrogate Model for Comparison
5.3. Attack Performance for Comparisons
5.3.1. Weak Transfer Scenario
5.3.2. Strong Transfer Scenario
5.4. Attack Results with Various Perturbation Rate
5.5. Sensitivity to User Feature Perturbation Hyperparameters
5.6. Effect of the Feature Perturbation Generator Network Depth on Attack Performance
5.7. Influence Analysis of Feature Perturbation and Manipulated Trust Relationship
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Liu, J.; Xing, X.; Wang, T.; Jia, Z. A Survey on Graph Neural Networks Method under Social Recommendation. In Proceedings of the 2023 9th Annual International Conference on Network and Information Systems for Computers (ICNISC), Wuhan, China, 27–29 October 2023; pp. 583–588. [Google Scholar]
- Hasson, S.G.; Piorkowski, J.; McCulloh, I. Social Media as a Main Source of Customer Feedback - Alternative to Customer Satisfaction Surveys. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Vancouver, BC, Canada, 27–30 August 2019; pp. 829–832. [Google Scholar]
- Liu, S.; Hu, X.; Wang, S.H.; Zhang, Y.D.; Fang, X.; Jiang, C. Mixing Patterns in Social Trust Networks: A Social Identity Theory Perspective. IEEE Trans. Comput. Soc. Syst. 2021, 8, 1249–1261. [Google Scholar] [CrossRef]
- Liu, G.; Yang, Q.; Wang, H.; Lin, X.; Wittie, M.P. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 1698–1706. [Google Scholar]
- Jin, K.; Payas, G.; Jun, H.; Emmanuel, O. OTO: Online trust oracle for user-centric trust establishment. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12), Raleigh, NC, USA, 16–18 October 2012; pp. 391–403. [Google Scholar]
- Yu, H.; Gibbons, P.B.; Kaminsky, M. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. IEEE/ACM Trans. Netw. 2010, 18, 885–898. [Google Scholar] [CrossRef]
- Niu, X.; Liu, G.; Yang, Q. Trustworthy Website Detection Based on Social Hyperlink Network Analysis. IEEE Trans. Netw. Sci. Eng. 2020, 7, 54–65. [Google Scholar] [CrossRef]
- Paolo, M.; Paolo, A. Controversial users demand local trust metrics: An experimental study on epinions. com community. In Proceedings of the National Conference on Artificial Intelligence, Pittsburgh, PA, USA, 9–13 July 2005; Volume 20, p. 121. [Google Scholar]
- Zoltan, G.; Hector, G.M.; Jan, P. Combating web spam with trustrank. In Proceedings of the Thirtieth International Conference on Very Large Data Bases(VLDB 2004), Toronto, ON, Canada, 29 August–3 September 2004; pp. 576–587. [Google Scholar]
- Golbeck, J.; Hendler, J.A. FilmTrust: Movie recommendations using trust in web-based social networks. In Proceedings of the 2006 3rd IEEE Consumer Communications and Networking Conference(CCNC 2006); IEEE: New York, NY, USA, 2006; Volume 1, pp. 282–286. [Google Scholar]
- Liu, G.; Chen, Q.; Yang, Q.; Zhu, B.; Wang, H.; Wang, W. Opinionwalk: An efficient solution to massive trust assessment in online social networks. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications; IEEE: New York, NY, USA, 2017; pp. 1–9. [Google Scholar]
- Wu, Z.; Pan, S.; Chen, F.; Long, G.; Zhang, C.; Yu, P.S. A Comprehensive Survey on Graph Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 4–24. [Google Scholar] [CrossRef] [PubMed]
- William, L.H.; Rex, Y.; Jure, L. Inductive Representation Learning on Large Graphs. In Proceedings of the International Conference on Neural Information Processing Systems, Long Beach, CA, USA, 4–9 December 2017; pp. 1–9. [Google Scholar]
- Lin, W.; Gao, Z.; Li, B. Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications; IEEE: New York, NY, USA, 2020; pp. 914–923. [Google Scholar]
- Jiang, N.; Wen, J.; Li, J.; Liu, X.; Jin, D. GATrust: A Multi-Aspect Graph Attention Network Model for Trust Assessment in OSNs. IEEE Trans. Knowl. Data Eng. 2023, 35, 5865–5878. [Google Scholar] [CrossRef]
- Huo, C.; He, D.; Liang, C.; Jin, D.; Qiu, T.; Wu, L. TrustGNN: Graph Neural Network-Based Trust Evaluation via Learnable Propagative and Composable Nature. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 14205–14217. [Google Scholar] [CrossRef] [PubMed]
- Petar, V.; Guillem, C.; Arantxa, C.; Adriana, R.; Pietro, L.; Yoshua, B. Graph Attention Networks. In Proceedings of the International Conference on Learning Representations (ICLR), Vancouver, BC, Canada, 30 April–3 May 2018. [Google Scholar]
- Kipf, T.N.; Welling, M. Semi-Supervised Classification with Graph Convolutional Networks. In Proceedings of the International Conference on Machine Learning (ICML 2017), Sydney, Australia, 6–11 August 2017. [Google Scholar]
- Zügner, D.; Akbarnejad, A.; Günnemann, S. Adversarial attacks on neural networks for graph data. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, London, UK, 19–23 August 2018; pp. 2847–2856. [Google Scholar]
- Zhu, Y.; Lai, Y.; Zhao, K.; Luo, X.; Yuan, M.; Ren, J.; Zhou, K. BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. In Proceedings of the 2022 IEEE 38th International Conference on Data Engineering (ICDE); IEEE: New York, NY, USA, 2022; pp. 14–26. [Google Scholar]
- Zhao, S.; Wang, W.; Du, Z.; Chen, J.; Duan, Z. A Black-Box Adversarial Attack Method via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural Networks. IEEE Trans. Big Data 2023, 9, 1586–1597. [Google Scholar] [CrossRef]
- Chen, J.; Zhang, J.; Chen, Z.; Du, M.; Xuan, Q. Time-aware gradient attack on dynamic network link prediction. IEEE Trans. Knowl. Data Eng. 2021, 35, 2091–2102. [Google Scholar] [CrossRef]
- Godziszewski, M.T.; Michalak, T.P.; Waniek, M.; Rahwan, T.; Zhou, K.; Zhu, Y. Attacking similarity-based sign prediction. In Proceedings of the 2021 IEEE International Conference on Data Mining (ICDM); IEEE: New York, NY, USA, 2021; pp. 1072–1077. [Google Scholar]
- Zhu, Y.; Michalak, T.; Luo, X.; Zhang, X.; Zhou, K. Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. IEEE Trans. Inf. Forensics Secur. 2024, 19, 3567–3580. [Google Scholar] [CrossRef]
- Chang, H.; Rong, Y.; Xu, T.; Bian, Y.; Zhou, S.; Wang, X.; Huang, J.; Zhu, W. Not all low-pass filters are robust in graph convolutional networks. Adv. Neural Inf. Process. Syst. 2021, 34, 25058–25071. [Google Scholar]
- Xu, J.; Yang, Y.; Chen, J.; Jiang, X.; Wang, C.; Lu, J.; Sun, Y. Unsupervised adversarially robust representation learning on graphs. In Proceedings of the AAAI Conference on Artificial Intelligence, Online, 22 February–1 March 2022; Volume 36, pp. 4290–4298. [Google Scholar]
- Yu, S.; Zhao, M.; Fu, C.; Zheng, J.; Huang, H.; Shu, X.; Xuan, Q.; Chen, G. Target defense against link-prediction-based attacks via evolutionary perturbations. IEEE Trans. Knowl. Data Eng. 2019, 33, 754–767. [Google Scholar] [CrossRef]
- Zügner, D.; Günnemann, S. Adversarial Attacks on Graph Neural Networks via Meta Learning. In Proceedings of the International Conference on Learning Representations(ICLR2019), New Orleans, LA, USA, 6–9 May 2019; pp. 1–10. [Google Scholar]
- Chen, J.; Lin, X.; Shi, Z.; Liu, Y. Link prediction adversarial attack via iterative gradient attack. IEEE Trans. Comput. Soc. Syst. 2020, 7, 1081–1094. [Google Scholar] [CrossRef]
- Li, J.; Zhang, H.; Han, Z.; Rong, Y.; Cheng, H.; Huang, J. Adversarial attack on community detection by hiding individuals. In Proceedings of the Web Conference 2020, Taipei, Taiwan, 20–24 April 2020; pp. 917–927. [Google Scholar]
- Liu, Z.; Luo, Y.; Wu, L.; Liu, Z.; Li, S.Z. Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias. In Proceedings of the Advances in Neural Information Processing Systems(NIP), New Orleans, LA, USA, 28 November–9 December 2022; pp. 1–12. [Google Scholar]
- Li, J.; Xie, T.; Chen, L.; Xie, F.; He, X.; Zheng, Z. Adversarial Attack on Large Scale Graph. IEEE Trans. Knowl. Data Eng. 2023, 35, 82–95. [Google Scholar] [CrossRef]
- Lin, W.; Li, B. Medley: Predicting Social Trust in Time-Varying Online Social Networks. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications; IEEE: New York, NY, USA, 2021; pp. 1–10. [Google Scholar]
- Wen, J.; Jiang, N.; Li, J.; Liu, X.; Chen, H.; Ren, Y.; Yuan, Z.; Tu, Z. DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks. In Proceedings of the IEEE INFOCOM 2023—IEEE Conference on Computer Communications; IEEE: New York, NY, USA, 2023; pp. 1–10. [Google Scholar]
- Wang, J.; Yan, Z.; Lan, J.; Bertino, E.; Pedrycz, W. TrustGuard: GNN-Based Robust and Explainable Trust Evaluation with Dynamicity Support. IEEE Trans. Dependable Secur. Comput. 2024, 21, 4433–4450. [Google Scholar] [CrossRef]
- Zhou, X.; Yi, Y.; Jia, G. Path-RotatE: Knowledge Graph Embedding by Relational Rotation of Path in Complex Space. In Proceedings of the 2021 IEEE/CIC International Conference on Communications in China (ICCC); IEEE: New York, NY, USA, 2021; pp. 905–910. [Google Scholar]
- Justin, G.; Samuel S., S.; Patrick F., R.; Oriol, V.; George E., D. Neural message passing for Quantum chemistry. In Proceedings of the 34th International Conference on Machine Learning (ICML 2017), Sydney, Australia, 6–11 August 2017; Volume 70, pp. 1263–1272. [Google Scholar]
- Simonovsky, M.; Komodakis, N. Dynamic Edge-Conditioned Filters in Convolutional Neural Networks on Graphs. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2017), Honolulu, HI, USA, 21–26 July 2017; pp. 29–38. [Google Scholar]
- Grover, A.; Leskovec, J. Node2vec: Scalable Feature Learning for Networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 855–864. [Google Scholar]
- Rockafellar, R.T. Lagrange multipliers and optimality. SIAM Rev. 1993, 35, 183–238. [Google Scholar] [CrossRef] [PubMed]
- Kingma, D.P.; Ba, J.L. Adam: A Method for Stochastic Optimization. In Proceedings of the International Conference on Learning Representations (ICLR), Toulon, France, 24–26 April 2017. [Google Scholar]
- Yao, Y.; Tong, H.; Yan, X.; Xu, F.; Lu, J. MATRI: A Multi-Aspect and Transitive Trust Inference Model. In Proceedings of the International World Wide Web Conference Committee, Rio de Janeiro, Brazil, 13–17 May 2013; pp. 1467–1476. [Google Scholar]
- Glorot, X.; Bengio, Y. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS 10), Sardinia, Italy, 13–15 May 2010; pp. 249–256. [Google Scholar]






| Notation | Description |
|---|---|
| the trust score of pairwise users | |
| the collection of pre-existing trust links | |
| the collection of in-neighbors of user x | |
| the collection of out-neighbors user x | |
| the dense embeddings information related to the observed trust relationship | |
| low-dimensional user embedding related to network structure | |
| trust popularity | |
| trust enthusiasm | |
| the learned latent embedding of users | |
| W | the weight matrix |
| b | the trainable bias |
| a nonlinear activation function | |
| the embedding of the trust relationship | |
| ∘ | the Hadamard product |
| ⊗ | the concatenation operator |
| the predicted trust level with the lowest probability in the surrogate model | |
| user features after attacks | |
| the Cosine similarity of user features before and after attacks | |
| L | the loss function valve |
| Datasets | Users | Edges | Avg Deg |
|---|---|---|---|
| Advogato | 6541 | 51,127 | 19.2 |
| PGP | 38,546 | 317,979 | 16.5 |
| Dataset | Advogato | PGP |
|---|---|---|
| Guardian | 0.733 | 0.864 |
| GATrust | 0.746 | 0.873 |
| TrustGNN | 0.739 | 0.878 |
| Surrogate model | 0.719 | 0.841 |
| Dataset | Advogato | PGP |
|---|---|---|
| Victim | Guardian | Guardian |
| Per rate | 5% | 5% |
| Clean | 0.733 | 0.864 |
| Random | 0.694 | 0.821 |
| Meta | 0.642 | 0.794 |
| Grab | 0.628 | 0.773 |
| NAG-R | 0.632 | 0.770 |
| T-Attack | 0.586 | 0.736 |
| Dataset | Advogato | PGP | Advogato | PGP |
|---|---|---|---|---|
| Victim | GATrust | GATrust | TrustGNN | TrustGNN |
| Per rate | 5% | 5% | 5% | 5% |
| Clean | 0.746 | 0.873 | 0.739 | 0.878 |
| Random | 0.712 | 0.843 | 0.714 | 0.840 |
| Meta | 0.698 | 0.821 | 0.703 | 0.818 |
| Grab | 0.675 | 0.808 | 0.672 | 0.813 |
| NAG-R | 0.678 | 0.818 | 0.678 | 0.815 |
| T-Attack | 0.644 | 0.773 | 0.649 | 0.769 |
| Datasets | Advogato | PGP | ||
|---|---|---|---|---|
| Victim | Guardian | GATrust | Guardian | GATrust |
| Per rate | 5% | 5% | 5% | 5% |
| and | 0.601 | 0.666 | 0.751 | 0.778 |
| and | 0.608 | 0.663 | 0.754 | 0.781 |
| and | 0.603 | 0.659 | 0.760 | 0.779 |
| and | 0.589 | 0.653 | 0.746 | 0.786 |
| and | 0.592 | 0.660 | 0.749 | 0.788 |
| and | 0.595 | 0.657 | 0.741 | 0.782 |
| and | 0.593 | 0.656 | 0.742 | 0.780 |
| and | 0.596 | 0.661 | 0.748 | 0.783 |
| and | 0.592 | 0.663 | 0.744 | 0.787 |
| and | 0.586 | 0.644 | 0.736 | 0.773 |
| Datasets | Advogato | PGP | ||
|---|---|---|---|---|
| Victim | Guardian | GATrust | Guardian | GATrust |
| Per rate | 5% | 5% | 5% | 5% |
| T-Attack(one-layer) | 0.665 | 0.683 | 0.805 | 0.831 |
| T-Attack(three-layer) | 0.623 | 0.659 | 0.782 | 0.811 |
| T-Attack | 0.586 | 0.644 | 0.736 | 0.773 |
| Datasets | Advogato | PGP | ||
|---|---|---|---|---|
| Victim | Guardian | GATrust | Guardian | GATrust |
| Per rate | 5% | 5% | 5% | 5% |
| T-Attack(UP) | 0.617 | 0.658 | 0.776 | 0.792 |
| T-Attack(TP) | 0.642 | 0.692 | 0.813 | 0.846 |
| T-Attack | 0.586 | 0.644 | 0.736 | 0.773 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Wen, J.; Jiang, N.; He, Y. T-Attack: Toward Black-Box Adversarial Attacks on GNN-Based Trust Prediction in OSNs. Mathematics 2026, 14, 1636. https://doi.org/10.3390/math14101636
Wen J, Jiang N, He Y. T-Attack: Toward Black-Box Adversarial Attacks on GNN-Based Trust Prediction in OSNs. Mathematics. 2026; 14(10):1636. https://doi.org/10.3390/math14101636
Chicago/Turabian StyleWen, Jie, Nan Jiang, and Yajie He. 2026. "T-Attack: Toward Black-Box Adversarial Attacks on GNN-Based Trust Prediction in OSNs" Mathematics 14, no. 10: 1636. https://doi.org/10.3390/math14101636
APA StyleWen, J., Jiang, N., & He, Y. (2026). T-Attack: Toward Black-Box Adversarial Attacks on GNN-Based Trust Prediction in OSNs. Mathematics, 14(10), 1636. https://doi.org/10.3390/math14101636

