{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:47:45Z","timestamp":1760316465491,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078834","type":"print"},{"value":"9783032078841","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07884-1_20","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:50Z","timestamp":1760286170000},"page":"388-409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Adversarial Robustness of\u00a0Graph Neural Networks with\u00a0Graph Reduction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4472-6396","authenticated-orcid":false,"given":"Kerui","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5917-2577","authenticated-orcid":false,"given":"Ka-Ho","family":"Chow","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9177-114X","authenticated-orcid":false,"given":"Wenqi","family":"Wei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5968-0344","authenticated-orcid":false,"given":"Lei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"20_CR1","unstructured":"Bojchevski, A., G\u00fcnnemann, S.: Adversarial attacks on node embeddings via graph poisoning. In: International Conference on Machine Learning, pp. 695\u2013704. PMLR (2019)"},{"key":"20_CR2","unstructured":"Chen, J., Wu, Y., Xu, X., Chen, Y., Zheng, H., Xuan, Q.: Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Chen, L., Li, J., Peng, Q., Liu, Y., Zheng, Z., Yang, C.: Understanding structural vulnerability in graph convolutional networks. arXiv preprint arXiv:2108.06280 (2021)","DOI":"10.24963\/ijcai.2021\/310"},{"key":"20_CR4","unstructured":"Chen, Y., et al.: Understanding and improving graph injection attack by promoting unnoticeability. arXiv preprint arXiv:2202.08057 (2022)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Dai, E., Lin, M., Zhang, X., Wang, S.: Unnoticeable backdoor attacks on graph neural networks. In: Proceedings of the ACM Web Conference 2023. pp. 2263\u20132273 (2023)","DOI":"10.1145\/3543507.3583392"},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/TCSI.2012.2215780","volume":"60","author":"F Dorfler","year":"2012","unstructured":"Dorfler, F., Bullo, F.: Kron reduction of graphs with applications to electrical networks. IEEE Trans. Circuits Syst. I Regul. Pap. 60(1), 150\u2013163 (2012)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Entezari, N., Al-Sayouri, S.A., Darvishzadeh, A., Papalexakis, E.E.: All you need is low (rank) defending against adversarial attacks on graphs. In: Proceedings of the 13th International Conference on Web Search and Data Mining, pp. 169\u2013177 (2020)","DOI":"10.1145\/3336191.3371789"},{"key":"20_CR8","first-page":"7637","volume":"34","author":"S Geisler","year":"2021","unstructured":"Geisler, S., Schmidt, T., \u015eirin, H., Z\u00fcgner, D., Bojchevski, A., G\u00fcnnemann, S.: Robustness of graph neural networks at scale. Adv. Neural. Inf. Process. Syst. 34, 7637\u20137649 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"1","key":"20_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-016-0332-2","volume":"6","author":"M Hamann","year":"2016","unstructured":"Hamann, M., Lindner, G., Meyerhenke, H., Staudt, C.L., Wagner, D.: Structure-preserving sparsification methods for social networks. Soc. Netw. Anal. Min. 6(1), 1\u201322 (2016). https:\/\/doi.org\/10.1007\/s13278-016-0332-2","journal-title":"Soc. Netw. Anal. Min."},{"key":"20_CR10","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. Advances in neural information processing systems 30 (2017)"},{"issue":"2","key":"20_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3447556.3447566","volume":"22","author":"W Jin","year":"2021","unstructured":"Jin, W., Li, Y., Xu, H., Wang, Y., Ji, S., Aggarwal, C., Tang, J.: Adversarial attacks and defenses on graphs. ACM SIGKDD Explorations Newsl 22(2), 19\u201334 (2021)","journal-title":"ACM SIGKDD Explorations Newsl"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Ju, M., Fan, Y., Zhang, C., Ye, Y.: Let graph be the go board: gradient-free node injection attack for graph neural networks via reinforcement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 4383\u20134390 (2023)","DOI":"10.1609\/aaai.v37i4.25558"},{"key":"20_CR13","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"20_CR14","unstructured":"Li, K., Liu, Y., Ao, X., He, Q.: Revisiting graph adversarial attack and defense from a data distribution perspective. In: The Eleventh International Conference on Learning Representations (2022)"},{"key":"20_CR15","unstructured":"Li, Y., Jin, W., Xu, H., Tang, J.: Deeprobust: A pytorch library for adversarial attacks and defenses. arXiv preprint arXiv:2005.06149 (2020)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ao, X., Qin, Z., Chi, J., Feng, J., Yang, H., He, Q.: Pick and choose: a gnn-based imbalanced learning approach for fraud detection. In: Proceedings of the Web Conference 2021, pp. 3168\u20133177 (2021)","DOI":"10.1145\/3442381.3449989"},{"key":"20_CR17","unstructured":"Liu, Z., Luo, Y., Wu, L., Liu, Z., Li, S.Z.: Towards reasonable budget allocation in untargeted graph structure attacks via gradient debias. arXiv preprint arXiv:2304.00010 (2023)"},{"issue":"116","key":"20_CR18","first-page":"1","volume":"20","author":"A Loukas","year":"2019","unstructured":"Loukas, A.: Graph reduction with spectral and cut guarantees. J. Mach. Learn. Res. 20(116), 1\u201342 (2019)","journal-title":"J. Mach. Learn. Res."},{"key":"20_CR19","unstructured":"Loukas, A., Vandergheynst, P.: Spectrally approximating large graphs with smaller graphs. In: International Conference on Machine Learning, pp. 3237\u20133246. PMLR (2018)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Ma, J., Deng, J., Mei, Q.: Adversarial attack on graph neural networks as an influence maximization problem. In: Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining, pp. 675\u2013685 (2022)","DOI":"10.1145\/3488560.3498497"},{"key":"20_CR21","unstructured":"Mirsky, Y., et al.: $$\\{$$VulChecker$$\\}$$: Graph-based vulnerability localization in source code. In: 32nd USENIX Security Symposium, pp. 6557\u20136574 (2023)"},{"issue":"1","key":"20_CR22","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1137\/100791142","volume":"9","author":"D Ron","year":"2011","unstructured":"Ron, D., Safro, I., Brandt, A.: Relaxation-based coarsening and multiscale graph organization. Multiscale Modeling Simul. 9(1), 407\u2013423 (2011)","journal-title":"Multiscale Modeling Simul."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Satuluri, V., Parthasarathy, S., Ruan, Y.: Local graph sparsification for scalable clustering. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 721\u2013732 (2011)","DOI":"10.1145\/1989323.1989399"},{"issue":"4","key":"20_CR24","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1017\/nws.2016.20","volume":"4","author":"CL Staudt","year":"2016","unstructured":"Staudt, C.L., Sazonovs, A., Meyerhenke, H.: Networkit: a tool suite for large-scale complex network analysis. Network Sci. 4(4), 508\u2013530 (2016)","journal-title":"Network Sci."},{"issue":"3","key":"20_CR25","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1093\/bib\/bbz042","volume":"21","author":"M Sun","year":"2020","unstructured":"Sun, M., Zhao, S., Gilvary, C., Elemento, O., Zhou, J., Wang, F.: Graph convolutional networks for computational drug development and discovery. Brief. Bioinform. 21(3), 919\u2013935 (2020)","journal-title":"Brief. Bioinform."},{"key":"20_CR26","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Wen, L., Liang, J., Yao, K., Wang, Z.: Black-box adversarial attack on graph neural networks with node voting mechanism. IEEE Trans. Knowl. Data Eng. (2024)","DOI":"10.1109\/TKDE.2024.3380750"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., Zhu, L.: Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610 (2019)","DOI":"10.24963\/ijcai.2019\/669"},{"key":"20_CR29","unstructured":"Wu, K., Chow, K.H., Wei, W., Yu, L.: On the adversarial robustness of graph neural networks with graph reduction. arXiv preprint arXiv:2412.05883 (2024)"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Xu, K., et al.: Topology attack and defense for graph neural networks: an optimization perspective. arXiv preprint arXiv:1906.04214 (2019)","DOI":"10.24963\/ijcai.2019\/550"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Xu, X., Yuruk, N., Feng, Z., Schweiger, T.A.: Scan: a structural clustering algorithm for networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 824\u2013833 (2007)","DOI":"10.1145\/1281192.1281280"},{"key":"20_CR32","unstructured":"Zhang, S., Sohrabizadeh, A., Wan, C., Huang, Z., Hu, Z., Wang, Y., Cong, J., Sun, Y., et\u00a0al.: A survey on graph neural network acceleration: Algorithms, systems, and customized hardware. arXiv preprint arXiv:2306.14052 (2023)"},{"key":"20_CR33","first-page":"9263","volume":"33","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Zitnik, M.: Gnnguard: defending graph neural networks against adversarial attacks. Adv. Neural. Inf. Process. Syst. 33, 9263\u20139275 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Jia, J., Wang, B., Gong, N.Z.: Backdoor attacks to graph neural networks. In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, pp. 15\u201326 (2021)","DOI":"10.1145\/3450569.3463560"},{"key":"20_CR35","unstructured":"Zheng, Q., Zou, X., Dong, Y., Cen, Y., Yin, D., Xu, J., Yang, Y., Tang, J.: Graph robustness benchmark: Benchmarking the adversarial robustness of graph machine learning. arXiv preprint arXiv:2111.04314 (2021)"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Zhu, D., Zhang, Z., Cui, P., Zhu, W.: Robust graph convolutional networks against adversarial attacks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1399\u20131407 (2019)","DOI":"10.1145\/3292500.3330851"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Mandulak, M., Wu, K., Slota, G., Jeon, Y., Chow, K.H., Yu, L.: On the robustness of graph reduction against gnn backdoor. In: 17th ACM Workshop on Artificial Intelligence and Security (2024)","DOI":"10.1145\/3689932.3694762"},{"issue":"5","key":"20_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3394520","volume":"14","author":"D Z\u00fcgner","year":"2020","unstructured":"Z\u00fcgner, D., Borchert, O., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on graph neural networks: perturbations and their patterns. ACM Trans. Knowl. Discovery Data (TKDD) 14(5), 1\u201331 (2020)","journal-title":"ACM Trans. Knowl. Discovery Data (TKDD)"},{"key":"20_CR39","unstructured":"Z\u00fcgner, D., G\u00fcnnemann, S.: Adversarial attacks on graph neural networks via meta learning. CoRR abs\/1902.08412 (2019). http:\/\/arxiv.org\/abs\/1902.08412"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07884-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:23:01Z","timestamp":1760286181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07884-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032078834","9783032078841"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07884-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}