https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/Head https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://www.nanopub.org/nschema#hasAssertion https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://www.nanopub.org/nschema#hasProvenance https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/provenance https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://www.nanopub.org/nschema#hasPublicationInfo https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/pubinfo https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.nanopub.org/nschema#Nanopublication https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/dc/terms/title LLMAtKGE: Large Language Models as Explainable Attackers against Knowledge Graph Embeddings https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/describes https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#AnyBURL https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#BhardwajEtAlInfluenceFunctionAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#CRIAGE https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#EdgeEtAl https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#EtD https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#GcR https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#GraphRAG https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#HippoRAG https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#InfluenceFunctionsAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#KGLLM https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#KICGPT https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#KON https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#KapoorEtAlPerturbationAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#MKGL https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#MPIKGC https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#PLMAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#RandomAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#RoG https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#SimpleDirectAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#ToG https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#ToG2 https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#ZhaoEtAlRuleBasedAttack https://doi.org/10.48550/arXiv.2510.11584 http://purl.org/spar/cito/discusses https://neverblink.eu/ontologies/llm-kg/methods#ZhouEtAlPoisoningAttack https://doi.org/10.48550/arXiv.2510.11584 http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/ns/prov#Entity https://neverblink.eu/ontologies/llm-kg/methods#AnyBURL http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#AnyBURL http://www.w3.org/2000/01/rdf-schema#label AnyBURL https://neverblink.eu/ontologies/llm-kg/methods#BhardwajEtAlInfluenceFunctionAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#BhardwajEtAlInfluenceFunctionAttack http://www.w3.org/2000/01/rdf-schema#label Bhardwaj et al. Influence Function Attack https://neverblink.eu/ontologies/llm-kg/methods#CRIAGE http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#CRIAGE http://www.w3.org/2000/01/rdf-schema#label CRIAGE https://neverblink.eu/ontologies/llm-kg/methods#EdgeEtAl http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#EdgeEtAl http://www.w3.org/2000/01/rdf-schema#label Edge et al. https://neverblink.eu/ontologies/llm-kg/methods#EtD http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#EtD http://www.w3.org/2000/01/rdf-schema#label EtD https://neverblink.eu/ontologies/llm-kg/methods#GcR http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#GcR http://www.w3.org/2000/01/rdf-schema#label GcR https://neverblink.eu/ontologies/llm-kg/methods#GraphRAG http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#GraphRAG http://www.w3.org/2000/01/rdf-schema#label GraphRAG https://neverblink.eu/ontologies/llm-kg/methods#HippoRAG http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#HippoRAG http://www.w3.org/2000/01/rdf-schema#label HippoRAG https://neverblink.eu/ontologies/llm-kg/methods#InfluenceFunctionsAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#InfluenceFunctionsAttack http://www.w3.org/2000/01/rdf-schema#label Influence Functions (IF) Attack https://neverblink.eu/ontologies/llm-kg/methods#KGLLM http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#KGLLM http://www.w3.org/2000/01/rdf-schema#label KG-LLM https://neverblink.eu/ontologies/llm-kg/methods#KICGPT http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#KICGPT http://www.w3.org/2000/01/rdf-schema#label KICGPT https://neverblink.eu/ontologies/llm-kg/methods#KON http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#KON http://www.w3.org/2000/01/rdf-schema#label K-ON https://neverblink.eu/ontologies/llm-kg/methods#KapoorEtAlPerturbationAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#KapoorEtAlPerturbationAttack http://www.w3.org/2000/01/rdf-schema#label Kapoor et al. Perturbation Attack https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE http://purl.org/dc/terms/subject https://neverblink.eu/ontologies/llm-kg/categories#SynergizedKnowledgeRepresentation https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE http://purl.org/spar/fabio/hasURL https://github.com/liting1024/LLMAtKGE https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE http://www.w3.org/2000/01/rdf-schema#comment LLMAtKGE is a unified framework leveraging LLMs to perform explainable adversarial attacks on KGEs. A core component, "High-order Adjacency Tuning LLM for Filtering," precomputes multi-hop KG structural information and transforms it into the LLM's embedding space via a dedicated adapter. This adapter, jointly trained with the LLM using LoRA on a triple classification task, acts as a KG fusion module that effectively represents knowledge from both sources, thus fitting the SynergizedKnowledgeRepresentation category. https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE http://www.w3.org/2000/01/rdf-schema#label LLMAtKGE https://neverblink.eu/ontologies/llm-kg/methods#LLMAtKGE https://neverblink.eu/ontologies/llm-kg/hasTopCategory https://neverblink.eu/ontologies/llm-kg/top-categories#SynergizedLLMKG https://neverblink.eu/ontologies/llm-kg/methods#MKGL http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#MKGL http://www.w3.org/2000/01/rdf-schema#label MKGL https://neverblink.eu/ontologies/llm-kg/methods#MPIKGC http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#MPIKGC http://www.w3.org/2000/01/rdf-schema#label MPIKGC https://neverblink.eu/ontologies/llm-kg/methods#PLMAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#PLMAttack http://www.w3.org/2000/01/rdf-schema#label PLM-Attack https://neverblink.eu/ontologies/llm-kg/methods#RandomAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#RandomAttack http://www.w3.org/2000/01/rdf-schema#label Random Attack https://neverblink.eu/ontologies/llm-kg/methods#RoG http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#RoG http://www.w3.org/2000/01/rdf-schema#label RoG https://neverblink.eu/ontologies/llm-kg/methods#SimpleDirectAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#SimpleDirectAttack http://www.w3.org/2000/01/rdf-schema#label Simple Direct Attack https://neverblink.eu/ontologies/llm-kg/methods#ToG http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#ToG http://www.w3.org/2000/01/rdf-schema#label ToG https://neverblink.eu/ontologies/llm-kg/methods#ToG2 http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#ToG2 http://www.w3.org/2000/01/rdf-schema#label ToG2 https://neverblink.eu/ontologies/llm-kg/methods#ZhaoEtAlRuleBasedAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#ZhaoEtAlRuleBasedAttack http://www.w3.org/2000/01/rdf-schema#label Zhao et al. Rule-based Attack https://neverblink.eu/ontologies/llm-kg/methods#ZhouEtAlPoisoningAttack http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/spar/fabio/Workflow https://neverblink.eu/ontologies/llm-kg/methods#ZhouEtAlPoisoningAttack http://www.w3.org/2000/01/rdf-schema#label Zhou et al. Poisoning Attack https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/provenance https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion http://www.w3.org/ns/prov#wasAttributedTo https://neverblink.eu/ontologies/llm-kg/agent https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/assertion http://www.w3.org/ns/prov#wasDerivedFrom https://doi.org/10.48550/arXiv.2510.11584 https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/pubinfo https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://purl.org/dc/terms/created 2026-02-26T15:35:01.826Z https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://purl.org/dc/terms/creator https://neverblink.eu/ontologies/llm-kg/agent https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://purl.org/nanopub/x/hasNanopubType https://neverblink.eu/ontologies/llm-kg/PaperAssessmentResult https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A http://www.w3.org/2000/01/rdf-schema#label LLM-KG assessment for paper 10.48550/arXiv.2510.11584 https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig http://purl.org/nanopub/x/hasAlgorithm RSA https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig http://purl.org/nanopub/x/hasPublicKey MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwNz2QK3SEifno78S7+48zUB0xpTex3mAzW73ZimHqNcdEMU5/apslrGrTHGFAt/Chocgo++r6JQp5ygY7NyJHGWdaIqnt85pjX4PbNfLAvapyUO00qZP34fY61w4eZ9UMtleWEsmZKRtQPyJ8ODl46i/rfPuZlcJGpM9Nmy5mpGWuepqIEvF4a/t7pLVeCEDFSYXT+yaiygt6ynIK5f7TtEDhZpeUf/Q74WhMPJXm4yTU/hqOX4IW+50kWHNArGGZwUaXwzyG6M3Zd6UMModryGkLqS4H/MSE3ZA1Ylnms7BfWLEXhMWlaKi6HRV4nGRDLhxVSi9LSRi3LWKLhNIIQIDAQAB https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig http://purl.org/nanopub/x/hasSignature hYBjvoSghswtFDYpqiie8iOOVKdSv+Ycmwsr9/7TrjSKsL/AMgC7tnKkMRNM91PBWsQsQt7/QFhFWL2khpIuzpO4pTOEDsUtLhhD/Z4xkpWQh8gu/0TY/v3niCK3xCa+Dl3whhYtKrqorkgLiMj05dKQNE8uZjtpR9v8fBjb1PwRoijOAlqGc37wObmIYFmL6CNCIeSWqMNHbu1iTnNdVF7bHIpjZRRRMEi9xjmg8lc2kL7jUQxXKzvu7WXKKZjHc5uI245LGtw9cUZxrogfxpqINFpu4VT8STaV3PQBLYsvoVeSg9p0XGax7GuHw97dvuCSpGIv8FhW4tgCIO/4nQ== https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig http://purl.org/nanopub/x/hasSignatureTarget https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A https://w3id.org/np/RAXXMQrbFzgvifBpQ5z4XnoIyhFLANc365Gj8SwxROc3A/sig http://purl.org/nanopub/x/signedBy https://neverblink.eu/ontologies/llm-kg/agent