https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/Head
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://www.nanopub.org/nschema#hasAssertion
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://www.nanopub.org/nschema#hasProvenance
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/provenance
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://www.nanopub.org/nschema#hasPublicationInfo
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/pubinfo
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.nanopub.org/nschema#Nanopublication
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/dc/terms/title
LLMAtKGE: Large Language Models as Explainable Attackers against Knowledge Graph Embeddings
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/describes
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#AnyBURL
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#BhardwajEtAlInfluenceFunctionAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#CRIAGE
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#EdgeEtAl
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#EtD
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#GcR
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#GraphRAG
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#HippoRAG
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#InfluenceFunctionsAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#KGLLM
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#KICGPT
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#KON
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#KapoorEtAlPerturbationAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#MKGL
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#MPIKGC
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#PLMAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#RandomAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#RoG
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#SimpleDirectAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#ToG
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#ToG2
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#ZhaoEtAlRuleBasedAttack
https://doi.org/10.48550/arXiv.2510.11584
http://purl.org/spar/cito/discusses
https://neverblink.eu/ontologies/llm-kg/methods#ZhouEtAlPoisoningAttack
https://doi.org/10.48550/arXiv.2510.11584
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#Entity
https://neverblink.eu/ontologies/llm-kg/methods#AnyBURL
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#AnyBURL
http://www.w3.org/2000/01/rdf-schema#label
AnyBURL
https://neverblink.eu/ontologies/llm-kg/methods#BhardwajEtAlInfluenceFunctionAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#BhardwajEtAlInfluenceFunctionAttack
http://www.w3.org/2000/01/rdf-schema#label
Bhardwaj et al. Influence Function Attack
https://neverblink.eu/ontologies/llm-kg/methods#CRIAGE
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#CRIAGE
http://www.w3.org/2000/01/rdf-schema#label
CRIAGE
https://neverblink.eu/ontologies/llm-kg/methods#EdgeEtAl
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#EdgeEtAl
http://www.w3.org/2000/01/rdf-schema#label
Edge et al.
https://neverblink.eu/ontologies/llm-kg/methods#EtD
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#EtD
http://www.w3.org/2000/01/rdf-schema#label
EtD
https://neverblink.eu/ontologies/llm-kg/methods#GcR
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#GcR
http://www.w3.org/2000/01/rdf-schema#label
GcR
https://neverblink.eu/ontologies/llm-kg/methods#GraphRAG
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#GraphRAG
http://www.w3.org/2000/01/rdf-schema#label
GraphRAG
https://neverblink.eu/ontologies/llm-kg/methods#HippoRAG
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#HippoRAG
http://www.w3.org/2000/01/rdf-schema#label
HippoRAG
https://neverblink.eu/ontologies/llm-kg/methods#InfluenceFunctionsAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#InfluenceFunctionsAttack
http://www.w3.org/2000/01/rdf-schema#label
Influence Functions (IF) Attack
https://neverblink.eu/ontologies/llm-kg/methods#KGLLM
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#KGLLM
http://www.w3.org/2000/01/rdf-schema#label
KG-LLM
https://neverblink.eu/ontologies/llm-kg/methods#KICGPT
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#KICGPT
http://www.w3.org/2000/01/rdf-schema#label
KICGPT
https://neverblink.eu/ontologies/llm-kg/methods#KON
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#KON
http://www.w3.org/2000/01/rdf-schema#label
K-ON
https://neverblink.eu/ontologies/llm-kg/methods#KapoorEtAlPerturbationAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#KapoorEtAlPerturbationAttack
http://www.w3.org/2000/01/rdf-schema#label
Kapoor et al. Perturbation Attack
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
http://purl.org/dc/terms/subject
https://neverblink.eu/ontologies/llm-kg/categories#SynergizedKnowledgeRepresentation
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
http://purl.org/spar/fabio/hasURL
https://github.com/liting1024/LLMAtKGE
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
http://www.w3.org/2000/01/rdf-schema#comment
LLMAtKGE is a unified framework leveraging LLMs to perform explainable adversarial attacks on KGEs. A core component, "High-order Adjacency Tuning LLM for Filtering," precomputes multi-hop KG structural information and transforms it into the LLM's embedding space via a dedicated adapter. This adapter, jointly trained with the LLM using LoRA on a triple classification task, acts as a KG fusion module that effectively represents knowledge from both sources, thus fitting the SynergizedKnowledgeRepresentation category.
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
http://www.w3.org/2000/01/rdf-schema#label
LLMAtKGE
https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE
https://neverblink.eu/ontologies/llm-kg/hasTopCategory
https://neverblink.eu/ontologies/llm-kg/top-categories#SynergizedLLMKG
https://neverblink.eu/ontologies/llm-kg/methods#MKGL
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#MKGL
http://www.w3.org/2000/01/rdf-schema#label
MKGL
https://neverblink.eu/ontologies/llm-kg/methods#MPIKGC
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#MPIKGC
http://www.w3.org/2000/01/rdf-schema#label
MPIKGC
https://neverblink.eu/ontologies/llm-kg/methods#PLMAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#PLMAttack
http://www.w3.org/2000/01/rdf-schema#label
PLM-Attack
https://neverblink.eu/ontologies/llm-kg/methods#RandomAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#RandomAttack
http://www.w3.org/2000/01/rdf-schema#label
Random Attack
https://neverblink.eu/ontologies/llm-kg/methods#RoG
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#RoG
http://www.w3.org/2000/01/rdf-schema#label
RoG
https://neverblink.eu/ontologies/llm-kg/methods#SimpleDirectAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#SimpleDirectAttack
http://www.w3.org/2000/01/rdf-schema#label
Simple Direct Attack
https://neverblink.eu/ontologies/llm-kg/methods#ToG
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#ToG
http://www.w3.org/2000/01/rdf-schema#label
ToG
https://neverblink.eu/ontologies/llm-kg/methods#ToG2
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#ToG2
http://www.w3.org/2000/01/rdf-schema#label
ToG2
https://neverblink.eu/ontologies/llm-kg/methods#ZhaoEtAlRuleBasedAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#ZhaoEtAlRuleBasedAttack
http://www.w3.org/2000/01/rdf-schema#label
Zhao et al. Rule-based Attack
https://neverblink.eu/ontologies/llm-kg/methods#ZhouEtAlPoisoningAttack
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/spar/fabio/Workflow
https://neverblink.eu/ontologies/llm-kg/methods#ZhouEtAlPoisoningAttack
http://www.w3.org/2000/01/rdf-schema#label
Zhou et al. Poisoning Attack
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/provenance
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion
http://www.w3.org/ns/prov#wasAttributedTo
https://neverblink.eu/ontologies/llm-kg/agent
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion
http://www.w3.org/ns/prov#wasDerivedFrom
https://doi.org/10.48550/arXiv.2510.11584
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/pubinfo
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://purl.org/dc/terms/created
2026-02-26T15:35:01.826Z
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://purl.org/dc/terms/creator
https://neverblink.eu/ontologies/llm-kg/agent
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://purl.org/nanopub/x/hasNanopubType
https://neverblink.eu/ontologies/llm-kg/PaperAssessmentResult
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
http://www.w3.org/2000/01/rdf-schema#label
LLM-KG assessment for paper 10.48550/arXiv.2510.11584
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig
http://purl.org/nanopub/x/hasAlgorithm
RSA
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig
http://purl.org/nanopub/x/hasPublicKey
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwNz2QK3SEifno78S7+48zUB0xpTex3mAzW73ZimHqNcdEMU5/apslrGrTHGFAt/Chocgo++r6JQp5ygY7NyJHGWdaIqnt85pjX4PbNfLAvapyUO00qZP34fY61w4eZ9UMtleWEsmZKRtQPyJ8ODl46i/rfPuZlcJGpM9Nmy5mpGWuepqIEvF4a/t7pLVeCEDFSYXT+yaiygt6ynIK5f7TtEDhZpeUf/Q74WhMPJXm4yTU/hqOX4IW+50kWHNArGGZwUaXwzyG6M3Zd6UMModryGkLqS4H/MSE3ZA1Ylnms7BfWLEXhMWlaKi6HRV4nGRDLhxVSi9LSRi3LWKLhNIIQIDAQAB
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig
http://purl.org/nanopub/x/hasSignature
hYBjvoSghswtFDYpqiie8iOOVKdSv+Ycmwsr9/7TrjSKsL/AMgC7tnKkMRNM91PBWsQsQt7/QFhFWL2khpIuzpO4pTOEDsUtLhhD/Z4xkpWQh8gu/0TY/v3niCK3xCa+Dl3whhYtKrqorkgLiMj05dKQNE8uZjtpR9v8fBjb1PwRoijOAlqGc37wObmIYFmL6CNCIeSWqMNHbu1iTnNdVF7bHIpjZRRRMEi9xjmg8lc2kL7jUQxXKzvu7WXKKZjHc5uI245LGtw9cUZxrogfxpqINFpu4VT8STaV3PQBLYsvoVeSg9p0XGax7GuHw97dvuCSpGIv8FhW4tgCIO/4nQ==
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig
http://purl.org/nanopub/x/hasSignatureTarget
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A
https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig
http://purl.org/nanopub/x/signedBy
https://neverblink.eu/ontologies/llm-kg/agent