Research Symposium

25th annual Undergraduate Research Symposium, April 1, 2025

Kien Le Poster Session 3: 1:45 pm - 2:45 pm/ Poster #169


Kien Le_UROP photo_0.jpg

BIO


Welcome to my profile! My name is Kien, a second-year student majoring in Computer Science. Originally from Vietnam, I have a strong interest in machine learning, artificial intelligence, and cybersecurity. My research focuses on adversarial machine learning, particularly the vulnerabilities of Graph Neural Networks (GNNs) in security-sensitive applications. Through the UROP program, I have been working on model extraction attacks against GNNs to better understand how attackers can replicate AI models under resource constraints. Beyond research, I am passionate about exploring the intersection of AI security and efficient machine learning techniques. My long-term career goal is to pursue research in academia, contributing to advancements in AI and the development of more robust and trustworthy machine learning systems.

CEGA: A Cost-Effective Approach for Graph-Based Model Extraction Attacks

Authors: Kien Le, Yushun Dong
Student Major: Computer Science
Mentor: Yushun Dong
Mentor's Department: Computer Science
Mentor's College: Arts and Sciences
Co-Presenters: Ken Anderson

Abstract


Graph Neural Networks (GNNs) are a powerful machine learning approach designed to analyze graph-structured data. By leveraging the connectivity of graphs, GNNs demonstrate their effectiveness in prediction tasks for social networks, biology, and finance. Such models, however, are expensive to train, leading companies to offer them as Machine Learning as a Service (MLaaS), allowing users to access GNNs via a pay-per-query system. But, this creates a security risk: adversaries can strategically query a GNN model to recreate its functionality through a Model Extraction Attack (MEA). In this poster, we investigate a MEA scenario where the attacker has limited knowledge of the target GNN model and apply transferable active learning to reduce the number of queries required to build a comprehensive surrogate model. Through experiments on multiple datasets, our approach achieves high fidelity and accuracy while maintaining strict query constraints.

Kien Le poster thumbnail_0.png

Keywords: AI, Machine Learning, Graph Neural Networks, Math, Security, Neural Network