Intruding with Words: Towards Understanding Graph Injection Attacks at the Text Level

Open in new window