{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T15:08:34Z","timestamp":1779203314269,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T00:00:00Z","timestamp":1592352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T00:00:00Z","timestamp":1592352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10618-020-00696-7","type":"journal-article","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T05:02:36Z","timestamp":1592370156000},"page":"1363-1389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Scalable attack on graph data by injecting vicious nodes"],"prefix":"10.1007","volume":"34","author":[{"given":"Jihong","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minnan","family":"Luo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fnu","family":"Suya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jundong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zijiang","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,6,17]]},"reference":[{"issue":"3","key":"696_CR1","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Disc 29(3):626\u2013688","journal-title":"Data Min Knowl Disc"},{"key":"696_CR2","unstructured":"Athalye A, Carlini N, Wagner D (2018) Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. arXiv:1802.00420"},{"key":"696_CR3","doi-asserted-by":"crossref","unstructured":"Bhagat S, Cormode G, Muthukrishnan S (2011) Node classification in social networks. In: Social network data analytics. Springer, pp 115\u2013148","DOI":"10.1007\/978-1-4419-8462-3_5"},{"key":"696_CR4","unstructured":"Bojcheski A, G\u00fcnnemann S (2018) Adversarial attacks on node embeddings. arXiv:1809.01093"},{"key":"696_CR5","unstructured":"Bojchevski A, G\u00fcnnemann S (2018) Adversarial attacks on node embeddings via graph poisoning. arXiv:1809.01093"},{"key":"696_CR6","unstructured":"Bolton RJ, Hand DJ et al (2001) Unsupervised profiling methods for fraud detection. In: Credit scoring and credit control, vol VII. pp 235\u2013255"},{"issue":"9","key":"696_CR7","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2018","unstructured":"Cai H, Zheng VW, Chang KCC (2018) A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans Knowl Data Eng 30(9):1616\u20131637","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"696_CR8","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"696_CR9","doi-asserted-by":"crossref","unstructured":"Chaoji V, Ranu S, Rastogi R, Bhatt R (2012) Recommendations to boost content spread in social networks","DOI":"10.1145\/2187836.2187908"},{"key":"696_CR10","unstructured":"Chen J, Ma T, Xiao C (2018) Fastgcn: fast learning with graph convolutional networks via importance sampling. arXiv:1801.10247"},{"key":"696_CR11","doi-asserted-by":"crossref","unstructured":"Chen Y, Nadji Y, Kountouras A, Monrose F, Vasiloglou N (2017) Practical attacks against graph-based clustering","DOI":"10.1145\/3133956.3134083"},{"issue":"6","key":"696_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.dam.2014.01.007","volume":"169","author":"BC Cs\u00e1ji","year":"2014","unstructured":"Cs\u00e1ji BC, Jungers RM, Blondel VD (2014) Pagerank optimization by edge selection. Discrete Appl Math 169(6):73\u201387","journal-title":"Discrete Appl Math"},{"key":"696_CR13","unstructured":"Dai H, Li H, Tian T, Huang X, Wang L, Zhu J, Song L (2018) Adversarial attack on graph structured data. arXiv:1806.02371"},{"key":"696_CR14","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"696_CR15","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572"},{"key":"696_CR16","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. In: Advances in neural information processing systems, pp 1024\u20131034"},{"issue":"2","key":"696_CR17","first-page":"97","volume":"40","author":"E Israeli","year":"2002","unstructured":"Israeli E, Wood RK (2002) Shortest-path network interdiction. Netw Int J 40(2):97\u2013111","journal-title":"Netw Int J"},{"key":"696_CR18","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv:1609.02907"},{"key":"696_CR19","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. In: International conference on learning representations, 2018"},{"issue":"2","key":"696_CR20","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1023\/A:1009953814988","volume":"3","author":"AK McCallum","year":"2000","unstructured":"McCallum AK, Nigam K, Rennie J, Seymore K (2000) Automating the construction of internet portals with machine learning. Inf Retr 3(2):127\u2013163","journal-title":"Inf Retr"},{"key":"696_CR21","doi-asserted-by":"crossref","unstructured":"Monti F, Boscaini D, Masci J, Rodola E, Svoboda J, Bronstein MM (2017) Geometric deep learning on graphs and manifolds using mixture model cnns. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 5115\u20135124","DOI":"10.1109\/CVPR.2017.576"},{"key":"696_CR22","doi-asserted-by":"crossref","unstructured":"Perozzi B, Akoglu L, Iglesias\u00a0S\u00e1nchez P, M\u00fcller E (2014a) Focused clustering and outlier detection in large attributed graphs. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. pp 1346\u20131355","DOI":"10.1145\/2623330.2623682"},{"key":"696_CR23","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014b) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"696_CR24","doi-asserted-by":"crossref","unstructured":"Pham T, Tran T, Phung D, Venkatesh S (2017) Column networks for collective classification. In: Thirty-first AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v31i1.10851"},{"key":"696_CR25","doi-asserted-by":"crossref","unstructured":"Phillips CA (1993) The network inhibition problem. In: ACM symposium on theory of computing","DOI":"10.1145\/167088.167286"},{"issue":"3","key":"696_CR26","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1609\/aimag.v29i3.2157","volume":"29","author":"P Sen","year":"2008","unstructured":"Sen P, Namata G, Bilgic M, Getoor L, Galligher B, Eliassi-Rad T (2008) Collective classification in network data. AI Mag 29(3):93\u201393","journal-title":"AI Mag"},{"key":"696_CR27","unstructured":"Sun Y, Wang S, Tang X, Hsieh TY, Honavar V (2019) Node injection attacks on graphs via reinforcement learning. arXiv:1909.06543"},{"key":"696_CR28","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:1312.6199"},{"key":"696_CR29","doi-asserted-by":"crossref","unstructured":"Tang J, Aggarwal C, Liu H (2016) Node classification in signed social networks. In: Proceedings of the 2016 SIAM international conference on data mining. SIAM, pp 54\u201362","DOI":"10.1137\/1.9781611974348.7"},{"key":"696_CR30","doi-asserted-by":"crossref","unstructured":"Tian F, Gao B, Cui Q, Chen E, Liu TY (2014) Learning deep representations for graph clustering. In: Twenty-eighth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v28i1.8916"},{"issue":"3\u20134","key":"696_CR31","first-page":"279","volume":"8","author":"CJ Watkins","year":"1992","unstructured":"Watkins CJ, Dayan P (1992) Q-learning. Mach Learn 8(3\u20134):279\u2013292","journal-title":"Mach Learn"},{"key":"696_CR32","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Yu PS (2019) A comprehensive survey on graph neural networks. arXiv:1901.00596"},{"key":"696_CR33","doi-asserted-by":"crossref","unstructured":"Ying R, He R, Chen K, Eksombatchai P, Hamilton WL, Leskovec J (2018) Graph convolutional neural networks for web-scale recommender systems. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining. pp 974\u2013983","DOI":"10.1145\/3219819.3219890"},{"key":"696_CR34","doi-asserted-by":"crossref","unstructured":"Zhang D, Yin J, Zhu X, Zhang C (2019) Attributed network embedding via subspace discovery. arXiv:1901.00596v4","DOI":"10.1007\/s10618-019-00650-2"},{"key":"696_CR35","doi-asserted-by":"crossref","unstructured":"Zhao M, An B, Yu Y, Liu S, Pan SJ (2018) Data poisoning attacks on multi-task relationship learning. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.11838"},{"key":"696_CR36","unstructured":"Zhou J, Cui G, Zhang Z, Yang C, Liu Z, Wang L, Li C, Sun M (2018) Graph neural networks: a review of methods and applications. arXiv:1812.08434"},{"key":"696_CR37","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner D, G\u00fcnnemann S (2019) Adversarial attacks on graph neural networks via meta learning. arXiv:1902.08412","DOI":"10.24963\/ijcai.2019\/872"},{"key":"696_CR38","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner D, Akbarnejad A, G\u00fcnnemann S (2018) Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 2847\u20132856","DOI":"10.1145\/3219819.3220078"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-020-00696-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10618-020-00696-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-020-00696-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T23:11:02Z","timestamp":1666998662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10618-020-00696-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,17]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["696"],"URL":"https:\/\/doi.org\/10.1007\/s10618-020-00696-7","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,17]]},"assertion":[{"value":"12 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}