“…Graph machine learning (GML) models, from network embedding [1,2,3] to graph neural networks (GNNs) [4,5,6,7,8,9], have shown promising performance in various domains, such as social network analysis [1], molecular graphs [5], and recommender systems [10]. However, GML models are known to be vulnerable to adversarial attacks [11,12,13,14,15,16,17,18]. Attackers can modify the original graph by adding or removing edges [11,19,20], perturbing node attributes [12,13,14,15], or injecting malicious nodes [16,17,18] to conduct adversarial attacks.…”