arXiv:2405.06247 [cs.LG]AbstractReferencesReviewsResources Classifications Subjects Themes Keywords graph adversarial attacks, corrupts distributed gnn training, computing node, current adversarial attack methods, large real-world graphs Tags conference paper Journal Information Publisher Journal Year Month Volume Number Pages DOI URL Miscellaneous Typesetting Pages Language License Submit Reset