{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:33:14Z","timestamp":1743107594157,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031534676"},{"type":"electronic","value":"9783031534683"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53468-3_9","type":"book-chapter","created":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T13:03:57Z","timestamp":1708347837000},"page":"100-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["UnboundAttack: Generating Unbounded Adversarial Attacks to\u00a0Graph Neural Networks"],"prefix":"10.1007","author":[{"given":"Sofiane","family":"Ennadir","sequence":"first","affiliation":[]},{"given":"Amr","family":"Alkhatib","sequence":"additional","affiliation":[]},{"given":"Giannis","family":"Nikolentzos","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Vazirgiannis","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Bostr\u00f6m","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Bhattad, A., Chong, M.J., Liang, K., Li, B., Forsyth, D.A.: Unrestricted adversarial examples via semantic manipulation (2019). https:\/\/doi.org\/10.48550\/ARXIV.1904.06347, https:\/\/arxiv.org\/abs\/1904.06347","DOI":"10.48550\/ARXIV.1904.06347"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Dai, H., et al.: Adversarial attack on graph structured data (2018). https:\/\/doi.org\/10.48550\/ARXIV.1806.02371, https:\/\/arxiv.org\/abs\/1806.02371","DOI":"10.48550\/ARXIV.1806.02371"},{"key":"9_CR3","unstructured":"Dai, H., et al.: Adversarial attack on graph structured data. In: Proceedings of the 35th International Conference on Machine Learning, pp. 1115\u20131124 (2018)"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"De\u00a0Cao, N., Kipf, T.: MolGAN: an implicit generative model for small molecular graphs (2018). https:\/\/doi.org\/10.48550\/ARXIV.1805.11973, https:\/\/arxiv.org\/abs\/1805.11973","DOI":"10.48550\/ARXIV.1805.11973"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Feng, F., He, X., Tang, J., Chua, T.S.: Graph adversarial training: dynamically regularizing based on graph structure (2019). https:\/\/doi.org\/10.48550\/ARXIV.1902.08226, https:\/\/arxiv.org\/abs\/1902.08226","DOI":"10.48550\/ARXIV.1902.08226"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Goodfellow, I.J., et al.: Generative adversarial networks (2014). https:\/\/doi.org\/10.48550\/ARXIV.1406.2661, https:\/\/arxiv.org\/abs\/1406.2661","DOI":"10.48550\/ARXIV.1406.2661"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of Wasserstein GANs (2017). https:\/\/doi.org\/10.48550\/ARXIV.1704.00028, https:\/\/arxiv.org\/abs\/1704.00028","DOI":"10.48550\/ARXIV.1704.00028"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Jang, E., Gu, S., Poole, B.: Categorical reparameterization with Gumbel-Softmax (2016). https:\/\/doi.org\/10.48550\/ARXIV.1611.01144, https:\/\/arxiv.org\/abs\/1611.01144","DOI":"10.48550\/ARXIV.1611.01144"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Jin, W., et al.: Adversarial attacks and defenses on graphs: a review, a tool and empirical studies (2020). https:\/\/doi.org\/10.48550\/ARXIV.2003.00653, https:\/\/arxiv.org\/abs\/2003.00653","DOI":"10.48550\/ARXIV.2003.00653"},{"issue":"8","key":"9_CR10","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10822-016-9938-8","volume":"30","author":"S Kearnes","year":"2016","unstructured":"Kearnes, S., McCloskey, K., Berndl, M., Pande, V., Riley, P.: Molecular graph convolutions: moving beyond fingerprints. J. Comput. Aided Mol. Des. 30(8), 595\u2013608 (2016)","journal-title":"J. Comput. Aided Mol. Des."},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks (2016). https:\/\/doi.org\/10.48550\/ARXIV.1609.02907, https:\/\/arxiv.org\/abs\/1609.02907","DOI":"10.48550\/ARXIV.1609.02907"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Kipf, T.N., Welling, M.: Variational graph auto-encoders (2016). https:\/\/doi.org\/10.48550\/ARXIV.1611.07308, https:\/\/arxiv.org\/abs\/1611.07308","DOI":"10.48550\/ARXIV.1611.07308"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Mu, J., Wang, B., Li, Q., Sun, K., Xu, M., Liu, Z.: A hard label black-box adversarial attack against graph neural networks (2021). https:\/\/doi.org\/10.48550\/ARXIV.2108.09513, https:\/\/arxiv.org\/abs\/2108.09513","DOI":"10.48550\/ARXIV.2108.09513"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Ramakrishnan, R., Dral, P.O., Rupp, M., von Lilienfeld, O.A.: Quantum chemistry structures and properties of 134 kilo molecules. Sci. Data 1, 140,022 (2014)","DOI":"10.1038\/sdata.2014.22"},{"key":"9_CR15","unstructured":"Schuchardt, J., Bojchevski, A., Gasteiger, J., G\u00fcnnemann, S.: Collective robustness certificates: exploiting interdependence in graph neural networks. In: International Conference on Learning Representations (2021). https:\/\/openreview.net\/forum?id=ULQdiUTHe3y"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Song, Y., Shu, R., Kushman, N., Ermon, S.: Constructing unrestricted adversarial examples with generative models (2018). https:\/\/doi.org\/10.48550\/ARXIV.1805.07894, https:\/\/arxiv.org\/abs\/1805.07894","DOI":"10.48550\/ARXIV.1805.07894"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Sun, Y., Wang, S., Tang, X., Hsieh, T.Y., Honavar, V.: Adversarial attacks on graph neural networks via node injections: a hierarchical reinforcement learning approach. In: Proceedings of The Web Conference 2020, WWW 2020, pp. 673\u2013683. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3366423.3380149","DOI":"10.1145\/3366423.3380149"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Wan, X., Kenlay, H., Ru, B., Blaas, A., Osborne, M.A., Dong, X.: Adversarial attacks on graph classification via Bayesian optimisation (2021). https:\/\/doi.org\/10.48550\/ARXIV.2111.02842, https:\/\/arxiv.org\/abs\/2111.02842","DOI":"10.48550\/ARXIV.2111.02842"},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Xu, K., et al.: Topology attack and defense for graph neural networks: an optimization perspective (2019). https:\/\/doi.org\/10.48550\/ARXIV.1906.04214, https:\/\/arxiv.org\/abs\/1906.04214","DOI":"10.48550\/ARXIV.1906.04214"},{"key":"9_CR20","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? In: 7th International Conference on Learning Representations (2019)"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"You, J., Ying, R., Ren, X., Hamilton, W.L., Leskovec, J.: GraphRNN: generating realistic graphs with deep auto-regressive models (2018). https:\/\/doi.org\/10.48550\/ARXIV.1802.08773, https:\/\/arxiv.org\/abs\/1802.08773","DOI":"10.48550\/ARXIV.1802.08773"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2018)","DOI":"10.1145\/3219819.3220078"},{"key":"9_CR23","unstructured":"Zhan, H., Pei, X.: Black-box gradient attack on graph neural networks: deeper insights in graph-based attack and defense. arXiv preprint arXiv:2104.15061 (2021)"},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Zhang, H., et al.: Projective ranking: a transferable evasion attack method on graph neural networks. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management, CIKM 2021, pp. 3617\u20133621. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3459637.3482161","DOI":"10.1145\/3459637.3482161"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Zhang, X., Zitnik, M.: GNNGuard: defending graph neural networks against adversarial attacks (2020). https:\/\/doi.org\/10.48550\/ARXIV.2006.08149, https:\/\/arxiv.org\/abs\/2006.08149","DOI":"10.48550\/ARXIV.2006.08149"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847\u20132856 (2018)","DOI":"10.1145\/3219819.3220078"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., G\u00fcnnemann, S.: Adversarial attacks on graph neural networks via meta learning. In: 7th International Conference on Learning Representations (2019)","DOI":"10.24963\/ijcai.2019\/872"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53468-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:08:54Z","timestamp":1718629734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53468-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031534676","9783031534683"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53468-3_9","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}