{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:45:59Z","timestamp":1748583959978,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031264085"},{"type":"electronic","value":"9783031264092"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26409-2_16","type":"book-chapter","created":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T09:04:46Z","timestamp":1678957486000},"page":"251-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Resisting Graph Adversarial Attack via\u00a0Cooperative Homophilous Augmentation"],"prefix":"10.1007","author":[{"given":"Zhihao","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Chenwang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Defu","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Enhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,17]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"95223","DOI":"10.1109\/ACCESS.2020.2993876","volume":"8","author":"T Zhong","year":"2020","unstructured":"Zhong, T., Wang, T., Wang, J., et al.: Multiple-aspect attentional graph neural networks for online social network user localization. IEEE Access 8, 95223\u201395234 (2020)","journal-title":"IEEE Access"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"20840","DOI":"10.1109\/ACCESS.2021.3055529","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu, X., Tan, H., Chen, Q., et al.: RAGAT: relation aware graph attention network for knowledge graph completion. IEEE Access 9, 20840\u201320849 (2021)","journal-title":"IEEE Access"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Wu, S., Tang, Y., Zhu, Y., et al.: Session-based recommendation with graph neural networks. In: Proceedings of the AAAI 2019, vol. 33, no. 01, pp. 346\u2013353 (2019)","DOI":"10.1609\/aaai.v33i01.3301346"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., Zhang, H., Han, Z., et al.: Adversarial attack on community detection by hiding individuals. In: Proceedings of the Web Conference 2020, pp. 917\u2013927 (2020)","DOI":"10.1145\/3366423.3380171"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, M., Hu, L., Shi, C., et al.: Adversarial label-flipping attack and defense for graph neural networks. In: Proceedings of ICDM 2020, pp. 791\u2013800. IEEE (2020)","DOI":"10.1109\/ICDM50108.2020.00088"},{"key":"16_CR6","first-page":"4756","volume":"33","author":"J Ma","year":"2020","unstructured":"Ma, J., Ding, S., Mei, Q.: Towards more practical adversarial attacks on graph neural networks. Adv. Neural. Inf. Process. Syst. 33, 4756\u20134766 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Zou, X., Zheng, Q., Dong, Y., et al.: TDGIA: effective injection attacks on graph neural networks. In: Proceedings of KDD 2021, pp. 2461\u20132471 (2021)","DOI":"10.1145\/3447548.3467314"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"issue":"6","key":"16_CR9","doi-asserted-by":"publisher","first-page":"2493","DOI":"10.1109\/TKDE.2019.2957786","volume":"33","author":"F Feng","year":"2019","unstructured":"Feng, F., He, X., Tang, J., et al.: Graph adversarial training: dynamically regularizing based on graph structure. IEEE Trans. Knowl. Data Eng. 33(6), 2493\u20132504 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Zhu, J., Jin, J., Loveland, D., et al.: On the Relationship between Heterophily and Robustness of Graph Neural Networks. arXiv preprint arXiv:2106.07767 (2021)","DOI":"10.1145\/3534678.3539418"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of KDD 2018, pp. 2847\u20132856 (2018)","DOI":"10.1145\/3219819.3220078"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., G\u00fcnnemann, S.: Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412 (2019)","DOI":"10.24963\/ijcai.2019\/872"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wang, S., Tang, X., et al.: Adversarial attacks on graph neural networks via node injections: a hierarchical reinforcement learning approach. In: Proceedings of the Web Conference 2020, pp. 673\u2013683 (2020)","DOI":"10.1145\/3366423.3380149"},{"issue":"5","key":"16_CR14","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1007\/s10618-020-00696-7","volume":"34","author":"J Wang","year":"2020","unstructured":"Wang, J., Luo, M., Suya, F., et al.: Scalable attack on graph data by injecting vicious nodes. Data Min. Knowl. Disc. 34(5), 1363\u20131389 (2020)","journal-title":"Data Min. Knowl. Disc."},{"key":"16_CR15","unstructured":"Wang, X., Cheng, M., Eaton, J., et al.: Attack graph convolutional networks by adding fake nodes. arXiv preprint arXiv:1810.10751 (2018)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Entezari, N., Al-Sayouri, S.A., Darvishzadeh, A., et al.: All you need is low (rank) defending against adversarial attacks on graphs. In: Proceedings of WSDM 2020, pp. 169\u2013177 (2020)","DOI":"10.1145\/3336191.3371789"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, C., Tyshetskiy, Y., et al.: Adversarial examples on graph data: deep insights into attack and defense. arXiv preprint arXiv:1903.01610 (2019)","DOI":"10.24963\/ijcai.2019\/669"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Jin, W., Ma, Y., Liu, X., et al.: Graph structure learning for robust graph neural networks. In: Proceedings of KDD 2020, pp. 66\u201374 (2020)","DOI":"10.1145\/3394486.3403049"},{"key":"16_CR19","first-page":"9263","volume":"33","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Zitnik, M.: GNNGuard: defending graph neural networks against adversarial attacks. Adv. Neural. Inf. Process. Syst. 33, 9263\u20139275 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"16_CR20","unstructured":"Lim, D., Li, X., Hohne, F., et al.: New benchmarks for learning on non-homophilous graphs. arXiv preprint arXiv:2104.01404 (2021)"},{"key":"16_CR21","unstructured":"Zhu, J., Yan, Y., Zhao, L., et al.: Beyond homophily in graph neural networks: current limitations and effective designs. In: Advances in NeurIPS 2020, vol. 33, pp. 7793\u20137804 (2020)"},{"key":"16_CR22","unstructured":"Bojchevski, A., G\u00fcnnemann, S.: Deep gaussian embedding of graphs: unsupervised inductive learning via ranking. arXiv preprint arXiv:1707.03815 (2017)"},{"issue":"2","key":"16_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1023\/A:1009953814988","volume":"3","author":"AK McCallum","year":"2000","unstructured":"McCallum, A.K., Nigam, K., Rennie, J., et al.: Automating the construction of internet portals with machine learning. Inf. Retrieval 3(2), 127\u2013163 (2000)","journal-title":"Inf. Retrieval"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Giles, C.L., Bollacker, K.D., Lawrence, S.: CiteSeer: an automatic citation indexing system. In: Proceedings of the Third ACM Conference on Digital Libraries, pp. 89\u201398 (1998)","DOI":"10.1145\/276675.276685"},{"key":"16_CR25","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"16_CR26","unstructured":"Chen, J., Wu, Y., Xu, X., et al.: Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018)"},{"issue":"1","key":"16_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TCSS.2020.3031058","volume":"8","author":"J Chen","year":"2020","unstructured":"Chen, J., Chen, Y., Zheng, H., et al.: MGA: momentum gradient attack on network. IEEE Trans. Comput. Soc. Syst. 8(1), 99\u2013109 (2020)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"16_CR28","unstructured":"Li, Y., Jin, W., Xu, H., et al.: Deeprobust: a pytorch library for adversarial attacks and defenses. arXiv preprint arXiv:2005.06149 (2020)"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Chen, D., Lin, Y., Li, W., et al.: Measuring and relieving the over-smoothing problem for graph neural networks from the topological view. In: Proceedings of the AAAI 2020, vol. 34, no. 04, pp. 3438\u20133445 (2020)","DOI":"10.1609\/aaai.v34i04.5747"},{"key":"16_CR30","unstructured":"Zhao, T., Liu, Y., Neves, L., et al.: Data augmentation for graph neural networks. arXiv preprint arXiv:2006.06830 (2020)"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Jin, M., Chang, H., Zhu, W., et al.: Power up! robust graph convolutional network via graph powering. In: 35th AAAI Conference on Artificial Intelligence (2021)","DOI":"10.1609\/aaai.v35i9.16976"},{"key":"16_CR32","volume-title":"Foundations of Machine Learning","author":"M Mohri","year":"2018","unstructured":"Mohri, M., Rostamizadeh, A., Talwalkar, A.: Foundations of Machine Learning. MIT Press, Cambridge (2018)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26409-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T09:23:48Z","timestamp":1678958628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26409-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031264085","9783031264092"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26409-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenoble","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1060","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"236","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17 demo track papers have been accepted from 28 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}