{"id":"https://openalex.org/W7105699155","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227820","title":"Topology-Driven Explainable GNNs for Trojan Detection in Deep Learning","display_name":"Topology-Driven Explainable GNNs for Trojan Detection in Deep Learning","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W7105699155","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227820"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11227820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Riccardo Ceccaroni","orcid":null},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Riccardo Ceccaroni","raw_affiliation_strings":["Universit&#x00E0; \"La Sapienza\",Department of Statistical Sciences,Roma,Italy"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; \"La Sapienza\",Department of Statistical Sciences,Roma,Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":null,"display_name":"Pierpaolo Brutti","orcid":null},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Pierpaolo Brutti","raw_affiliation_strings":["Universit&#x00E0; \"La Sapienza\",Department of Statistical Sciences,Roma,Italy"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; \"La Sapienza\",Department of Statistical Sciences,Roma,Italy","institution_ids":["https://openalex.org/I861853513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79164575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5529999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5529999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.3237000107765198,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.08420000225305557,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7728999853134155},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7638000249862671},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7416999936103821},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.557200014591217},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.5281999707221985},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5246999859809875},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4643999934196472}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7728999853134155},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7638000249862671},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7416999936103821},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7409999966621399},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6804999709129333},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.557200014591217},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.5281999707221985},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5246999859809875},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4643999934196472},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43709999322891235},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32760000228881836},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.31439998745918274},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2558000087738037}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11227820","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1748965","is_oa":false,"landing_page_url":"https://hdl.handle.net/11573/1748965","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4475233256816864,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1534499320","https://openalex.org/W2808426733","https://openalex.org/W2990270730","https://openalex.org/W3187009719","https://openalex.org/W3196546979","https://openalex.org/W4242053016","https://openalex.org/W4294982857","https://openalex.org/W4324007135","https://openalex.org/W4406946078"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"are":[4],"widely":[5],"used":[6],"in":[7,102,108],"critical":[8],"applications":[9],"such":[10],"as":[11,63],"autonomous":[12],"systems,":[13],"healthcare,":[14],"and":[15,100],"finance.":[16],"However,":[17],"their":[18],"increasing":[19],"deployment":[20],"raises":[21],"security":[22],"concerns,":[23],"particularly":[24],"against":[25],"adversarial":[26],"threats":[27],"like":[28],"Trojan":[29,71],"attacks.":[30],"These":[31],"attacks":[32],"embed":[33],"hidden":[34],"triggers":[35],"during":[36],"training,":[37],"causing":[38],"misclassifications":[39],"when":[40],"activated":[41],"while":[42],"maintaining":[43],"normal":[44],"performance":[45],"otherwise,":[46],"making":[47],"them":[48],"difficult":[49],"to":[50,79,92],"detect.":[51],"We":[52,73],"propose":[53],"a":[54],"novel":[55],"graph-based":[56],"detection":[57],"framework":[58,104],"that":[59],"models":[60],"neuron":[61],"activations":[62],"graph":[64],"structures,":[65],"capturing":[66],"topological":[67],"anomalies":[68],"indicative":[69],"of":[70,113,120],"behavior.":[72],"leverage":[74],"Graph":[75],"Neural":[76],"Networks":[77],"(GNNs)":[78],"identify":[80],"these":[81],"structural":[82],"deviations":[83],"effectively.":[84],"Additionally,":[85],"we":[86],"integrate":[87],"Explainable":[88],"AI":[89],"(XAI)":[90],"techniques":[91],"enhance":[93],"interpretability.":[94],"This":[95],"not":[96],"only":[97],"improves":[98],"trust":[99],"transparency":[101],"our":[103],"but":[105],"also":[106],"aids":[107],"understanding":[109],"the":[110,118],"fundamental":[111],"characteristics":[112],"backdoored":[114],"networks,":[115],"potentially":[116],"guiding":[117],"development":[119],"more":[121],"robust":[122],"defense":[123],"mechanisms.":[124]},"counts_by_year":[],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-11-14T00:00:00"}
