{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:41:25Z","timestamp":1771699285379,"version":"3.50.1"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,10,7]],"date-time":"2022-10-07T00:00:00Z","timestamp":1665100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,7]],"date-time":"2022-10-07T00:00:00Z","timestamp":1665100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s10994-022-06234-4","type":"journal-article","created":{"date-parts":[[2022,10,7]],"date-time":"2022-10-07T21:02:36Z","timestamp":1665176556000},"page":"2921-2953","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dealing with the unevenness: deeper insights in graph-based attack and defense"],"prefix":"10.1007","volume":"113","author":[{"given":"Haoxi","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Xiaobing","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,7]]},"reference":[{"key":"6234_CR1","unstructured":"Athalye, A., Carlini, N., & Wagner, D.A. (2018). Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In Dy, J.G., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning, ICML 2018, pp. 274\u2013283."},{"key":"6234_CR2","unstructured":"Bruna, J., Zaremba, W., Szlam, A.D., & LeCun, Y. (2014). Spectral networks and locally connected networks on graphs. CoRR abs\/1312.6203."},{"key":"6234_CR3","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TCYB.2014.2358564","volume":"45","author":"D Cai","year":"2015","unstructured":"Cai, D., & Chen, X. (2015). Large scale spectral clustering via landmark-based sparse representation. IEEE Transactions on Cybernetics, 45, 1669\u20131680.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"6234_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., & Wagner, D.A. (2017). Adversarial examples are not easily detected: Bypassing ten detection methods. In Thuraisingham, B.M., Biggio, B., Freeman, D.M., Miller, B., Sinha, A. (eds.) Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2017, (pp. 3\u201314).","DOI":"10.1145\/3128572.3140444"},{"key":"6234_CR5","unstructured":"Chang, H., Rong, Y., Xu, T., Huang, W., Zhang, H., Cui, P., Zhu, W., & Huang, J. (2019). The general black-box attack method for graph neural networks. arXiv:abs\/1908.01297."},{"key":"6234_CR6","unstructured":"Chen, J.J., Ma, T., & Xiao, C. (2018). Fastgcn: Fast learning with graph convolutional networks via importance sampling. arXiv:abs\/1801.10247."},{"key":"6234_CR7","unstructured":"Chen, J., Wu, Y., Xu, X., Chen, Y., Zheng, H., & Xuan, Q. (2018). Fast gradient attack on network embedding. arXiv:abs\/1809.02797"},{"issue":"4","key":"6234_CR8","doi-asserted-by":"publisher","first-page":"3279","DOI":"10.1109\/TNSE.2020.3024723","volume":"7","author":"Y-C Chen","year":"2020","unstructured":"Chen, Y.-C., Lu, P.-E., Chang, C.-S., & Liu, T.-H. (2020). A time-dependent sir model for covid-19 with undetectable infected persons. IEEE Transactions on Network Science and Engineering, 7(4), 3279\u20133294.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"6234_CR9","doi-asserted-by":"crossref","unstructured":"Cook, S.A. (1971). The complexity of theorem-proving procedures. Proceedings of the third annual ACM symposium on Theory of computing.","DOI":"10.1145\/800157.805047"},{"key":"6234_CR10","unstructured":"Dai, H., Li, H., Tian, T., Huang, X., Wang, L., Zhu, J., & Song, L. (2018). Adversarial attack on graph structured data. In Dy, J.G., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning, ICML 2018, (pp. 1123\u20131132)."},{"key":"6234_CR11","unstructured":"Dai, J., Zhu, W., & Luo, X. (2022). A targeted universal attack on graph convolutional network. arXiv:abs\/2011.14365"},{"key":"6234_CR12","unstructured":"Defferrard, M., Bresson, X., & Vandergheynst, P. (2016). Convolutional neural networks on graphs with fast localized spectral filtering. In Lee, D.D., Sugiyama, M., von Luxburg, U., Guyon, I., Garnett, R. (eds.) Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain, (pp. 3837\u20133845)."},{"key":"6234_CR13","doi-asserted-by":"crossref","unstructured":"Dinur, I., & Steurer, D. (2014). Analytical approach to parallel repetition. In Shmoys, D.B. (ed.) Symposium on Theory of Computing, STOC 2014, (pp. 624\u2013633).","DOI":"10.1145\/2591796.2591884"},{"key":"6234_CR14","doi-asserted-by":"crossref","unstructured":"Dong, H., Chen, J., Feng, F., He, X., Bi, S., Ding, Z., & Cui, P. (2021). On the equivalence of decoupled graph convolution network and label propagation. In Leskovec, J., Grobelnik, M., Najork, M., Tang, J., Zia, L. (eds.) WWW \u201921: The Web Conference 2021, (pp. 3651\u20133662).","DOI":"10.1145\/3442381.3449927"},{"key":"6234_CR15","doi-asserted-by":"crossref","unstructured":"Entezari, N., Al-Sayouri, S.A., Darvishzadeh, A., & Papalexakis, E.E. (2020). All you need is low (rank): Defending against adversarial attacks on graphs. In Caverlee, J., Hu, X.B., Lalmas, M., Wang, W. (eds.) WSDM \u201920: The Thirteenth ACM International Conference on Web Search and Data Mining, (pp. 169\u2013177).","DOI":"10.1145\/3336191.3371789"},{"key":"6234_CR16","unstructured":"Finkelshtein, B., Baskin, C., Zheltonozhskii, E., & Alon, U. (2020). Single-node attack for fooling graph neural networks. arXiv:abs\/2011.03574."},{"key":"6234_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.5195\/jmla.2018.280","volume":"106","author":"S Fricke","year":"2018","unstructured":"Fricke, S. (2018). Semantic scholar. Journal of the Medical Library Association\u202f: JMLA, 106, 145\u2013147.","journal-title":"Journal of the Medical Library Association : JMLA"},{"key":"6234_CR18","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1214\/aoms\/1177731944","volume":"11","author":"M Friedman","year":"1940","unstructured":"Friedman, M. (1940). A comparison of alternative tests of significance for the problem of m rankings. Annals of Mathematical Statistics, 11, 86\u201392.","journal-title":"Annals of Mathematical Statistics"},{"key":"6234_CR19","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F., & Brendel, W. (2019). Imagenet-trained cnns are biased towards texture; increasing shape bias improves accuracy and robustness. arXiv:abs\/1811.12231."},{"key":"6234_CR20","first-page":"7637","volume-title":"Advances in Neural Information Processing Systems","author":"S Geisler","year":"2021","unstructured":"Geisler, S., Schmidt, T., \u015eirin, H., Z\u00fcgner, D., Bojchevski, A., & G\u00fcnnemann, S. (2021). Robustness of graph neural networks at scale. In M. Ranzato, A. Beygelzimer, Y. Dauphin, P. S. Liang, & J. W. Vaughan (Eds.), Advances in Neural Information Processing Systems (Vol. 34, pp. 7637\u20137649). Red Hook, NY, USA: Curran Associates Inc."},{"key":"6234_CR21","first-page":"13272","volume-title":"Advances in Neural Information Processing Systems","author":"S Geisler","year":"2020","unstructured":"Geisler, S., Z\u00fcgner, D., & G\u00fcnnemann, S. (2020). Reliable graph neural networks via robust aggregation. In H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan, & H. Lin (Eds.), Advances in Neural Information Processing Systems (Vol. 33, pp. 13272\u201313284). Red Hook, NY, USA: Curran Associates Inc."},{"key":"6234_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804106","volume-title":"Computational Complexity: A Conceptual Perspective","author":"O Goldreich","year":"2008","unstructured":"Goldreich, O. (2008). Computational Complexity: A Conceptual Perspective. Cambridge: Cambridge University Press."},{"key":"6234_CR23","unstructured":"Goodfellow, I.J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. CoRR arxiv:abs\/1412.6572."},{"key":"6234_CR24","doi-asserted-by":"crossref","unstructured":"G\u00fcnnemann, S. (2022). In Wu, L., Cui, P., Pei, J., Zhao, L. (eds.) Graph Neural Networks: Adversarial Robustness, (pp. 149\u2013176). Springer, Singapore.","DOI":"10.1007\/978-981-16-6054-2_8"},{"key":"6234_CR25","doi-asserted-by":"crossref","unstructured":"Guo, J., Li, S., Zhao, Y., & Zhang, Y. (2022). Learning robust representation through graph adversarial contrastive learning. DASFAA 2022, Virtual Event, April 11\u201314, 2022, Proceedings, Part IDatabase Systems for Advanced Applications: 27th International Conference (pp. 682\u2013697). Berlin, Heidelberg: Springer.","DOI":"10.1007\/978-3-031-00123-9_54"},{"key":"6234_CR26","unstructured":"Hamilton, W.L., Ying, Z., & Leskovec, J. (2017). Inductive representation learning on large graphs. In: Guyon, I., von Luxburg, U., Bengio, S., Wallach, H.M., Fergus, R., Vishwanathan, S.V.N., Garnett, R. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, pp. 1024\u20131034"},{"key":"6234_CR27","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.1109\/TCYB.2018.2794998","volume":"49","author":"L He","year":"2019","unstructured":"He, L., Ray, N., Guan, Y., & Zhang, H. (2019). Fast large-scale spectral clustering via explicit feature mapping. IEEE Transactions on Cybernetics, 49, 1058\u20131071.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"6234_CR28","unstructured":"Hermann, K.L., Chen, T., & Kornblith, S. (2020). The origins and prevalence of texture bias in convolutional neural networks. In Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, (pp. 19000\u201319015)."},{"key":"6234_CR29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511840371","volume-title":"Topics in Matrix Analysis","author":"RA Horn","year":"1991","unstructured":"Horn, R. A., & Johnson, C. R. (1991). Topics in Matrix Analysis. New York: Cambridge University Press."},{"key":"6234_CR30","doi-asserted-by":"crossref","unstructured":"Jin, W., Derr, T., Wang, Y., Ma, Y., Liu, Z., & Tang, J. (2021). Node similarity preserving graph convolutional networks. In Lewin-Eytan, L., Carmel, D., Yom-Tov, E., Agichtein, E., Gabrilovich, E. (eds.) WSDM \u201921, The Fourteenth ACM International Conference on Web Search and Data Mining, (pp. 148\u2013156).","DOI":"10.1145\/3473044.3473045"},{"key":"6234_CR31","unstructured":"Jin, W., Li, Y., Xu, H., Wang, Y., & Tang, J. (2020). Adversarial attacks and defenses on graphs: A review and empirical study. arXiv:abs\/2003.00653."},{"key":"6234_CR32","doi-asserted-by":"crossref","unstructured":"Jin, W., Ma, Y., Liu, X., Tang, X., Wang, S., & Tang, J. (2020). Graph structure learning for robust graph neural networks. In Gupta, R., Liu, Y., Tang, J., Prakash, B.A. (eds.) KDD \u201920: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, (pp. 66\u201374).","DOI":"10.1145\/3394486.3403049"},{"key":"6234_CR33","first-page":"8463","volume-title":"Advances in Neural Information Processing Systems","author":"H Jin","year":"2020","unstructured":"Jin, H., Shi, Z., Peruri, V. J. S. A., & Zhang, X. (2020). Certified robustness of graph convolution networks for graph classification under topological attacks. In H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan, & H. Lin (Eds.), Advances in Neural Information Processing Systems (Vol. 33, pp. 8463\u20138474). Red Hook, NY, USA: Curran Associates Inc."},{"key":"6234_CR34","unstructured":"Kipf, T., & Welling, M. (2017). Semi-supervised classification with graph convolutional networks. arXiv:abs\/1609.02907."},{"key":"6234_CR35","volume-title":"Algorithm design","author":"J Kleinberg","year":"2005","unstructured":"Kleinberg, J., & Tardos, \u00c9. (2005). Algorithm design. Boston: Pearson."},{"key":"6234_CR36","doi-asserted-by":"crossref","unstructured":"Klicpera, J., Bojchevski, A., & G\u00fcnnemann, S. (2019). Predict then propagate: Graph neural networks meet personalized pagerank. In ICLR.","DOI":"10.1145\/3394486.3403296"},{"key":"6234_CR37","doi-asserted-by":"crossref","unstructured":"Li, Q., Han, Z., & Wu, X. (2018). Deeper insights into graph convolutional networks for semi-supervised learning. In McIlraith, S.A., Weinberger, K.Q. (eds.) Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th Innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), (pp. 3538\u20133545).","DOI":"10.1609\/aaai.v32i1.11604"},{"key":"6234_CR38","unstructured":"Li, Y., Jin, W., Xu, H., & Tang, J. (2020). Deeprobust: A pytorch library for adversarial attacks and defenses. arXiv:abs\/2005.06149."},{"key":"6234_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Z., & Zhou, J. (2020). Introduction to graph neural networks. In Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool, San Rafael.","DOI":"10.1007\/978-3-031-01587-8"},{"key":"6234_CR40","unstructured":"Liu, J., Wang, C., Danilevsky, M., & Han, J. (2013). Large-scale spectral clustering on graphs. In IJCAI."},{"key":"6234_CR41","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s10994-016-5603-7","volume":"106","author":"S Liu","year":"2016","unstructured":"Liu, S., Li, G., Tran, T., & Jiang, Y. (2016). Preference relation-based Markov random fields for recommender systems. Machine Learning, 106, 523\u2013546.","journal-title":"Machine Learning"},{"key":"6234_CR42","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1145\/185675.306789","volume":"41","author":"C Lund","year":"1994","unstructured":"Lund, C., & Yannakakis, M. (1994). On the hardness of approximating minimization problems. Journal of ACM, 41, 960\u2013981.","journal-title":"Journal of ACM"},{"key":"6234_CR43","doi-asserted-by":"crossref","unstructured":"Ma, J., Deng, J., & Mei, Q. (2022). Adversarial attack on graph neural networks as an influence maximization problem. WSDM \u201922, (pp. 675\u2013685). Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/3488560.3498497"},{"key":"6234_CR44","unstructured":"Ma, J., Ding, S., & Mei, Q. (2020). Towards more practical adversarial attacks on graph neural networks. In Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020."},{"key":"6234_CR45","unstructured":"Ma, Y., Wang, S., Wu, L., & Tang, J. (2019). Attacking graph convolutional networks via rewiring. arXiv:abs\/1906.03750."},{"key":"6234_CR46","volume-title":"Deep Learning on Graphs","author":"Y Ma","year":"2020","unstructured":"Ma, Y., & Tang, J. (2020). Deep Learning on Graphs. Cambridge: Cambridge University Press."},{"key":"6234_CR47","volume-title":"Distribution-free Multiple Comparisons","author":"PB Nemenyi","year":"1963","unstructured":"Nemenyi, P. B. (1963). Distribution-free Multiple Comparisons. Princeton: Princeton University."},{"key":"6234_CR48","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., et al. (2011). Scikit-learn: Machine learning in python. Journal of Machine Learning Research, 12, 2825\u20132830.","journal-title":"Journal of Machine Learning Research"},{"key":"6234_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1\u20135, 2013, Revised Selected Papers","author":"D Ron","year":"2013","unstructured":"Ron, D., & Shamir, A. (2013). Quantitative analysis of the full bitcoin transaction graph. Lecture Notes in Computer Science. In A. Sadeghi (Ed.), Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1\u20135, 2013, Revised Selected Papers (Vol. 7859, pp. 6\u201324). Heidelberg: Springer."},{"key":"6234_CR50","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1007\/s10994-016-5582-8","volume":"106","author":"G Rossetti","year":"2016","unstructured":"Rossetti, G., Pappalardo, L., Pedreschi, D., & Giannotti, F. (2016). Tiles: An online algorithm for community discovery in dynamic social networks. Machine Learning, 106, 1213\u20131241.","journal-title":"Machine Learning"},{"key":"6234_CR51","unstructured":"Schuchardt, J., Bojchevski, A., Gasteiger, J., & G\u00fcnnemann, S. (2021). Collective robustness certificates: Exploiting interdependence in graph neural networks. In: International Conference on Learning Representations."},{"key":"6234_CR52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019","volume-title":"Understanding Machine Learning\u2014From Theory to Algorithms","author":"S Shalev-Shwartz","year":"2014","unstructured":"Shalev-Shwartz, S., & Ben-David, S. (2014). Understanding Machine Learning\u2014From Theory to Algorithms. Cambridge: Cambridge University Press."},{"key":"6234_CR53","volume-title":"Introduction to the Theory of Computation","author":"M Sipser","year":"2013","unstructured":"Sipser, M. (2013). Introduction to the Theory of Computation (3rd ed.). Boston: Cengage Learning.","edition":"3"},{"key":"6234_CR54","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1006\/jagm.1997.0887","volume":"25","author":"P Slav\u00edk","year":"1997","unstructured":"Slav\u00edk, P. (1997). A tight analysis of the greedy algorithm for set cover. Journal of Algorithms, 25, 237\u2013254.","journal-title":"Journal of Algorithms"},{"key":"6234_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107560","volume":"109","author":"K Song","year":"2021","unstructured":"Song, K., Yao, X., Nie, F., Li, X., & Xu, M. (2021). Weighted bilateral k-means algorithm for fast co-clustering and fast spectral clustering. Pattern Recognition, 109, 107560.","journal-title":"Pattern Recognition"},{"key":"6234_CR56","unstructured":"Sun, L., Dou, Y., Yang, C., Wang, J., Yu, P.S., & Li, B. (2018). Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528."},{"key":"6234_CR57","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wang, S., Tang, X., Hsieh, T.-Y., & Honavar, V. (2020). Adversarial attacks on graph neural networks via node injections: A hierarchical reinforcement learning approach. In Huang, Y., King, I., Liu, T.-Y., van Steen, M. (eds.) Proceedings of The Web Conference 2020, (pp. 673\u2013683). Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/3366423.3380149"},{"key":"6234_CR58","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TNN.2004.842673","volume":"16","author":"R Sutton","year":"2005","unstructured":"Sutton, R., & Barto, A. (2005). Reinforcement learning: An introduction. IEEE Transactions on Neural Networks, 16, 285\u2013286.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"6234_CR59","doi-asserted-by":"crossref","unstructured":"Tang, X., Li, Y., Sun, Y., Yao, H., Mitra, P., & Wang, S. (2020). Transferring robustness for graph neural network against poisoning attacks. In: Caverlee, J., Hu, X.B., Lalmas, M., Wang, W. (eds.) WSDM \u201920: The Thirteenth ACM International Conference on Web Search and Data Mining, (pp. 600\u2013608).","DOI":"10.1145\/3336191.3371851"},{"key":"6234_CR60","volume-title":"Approximation Algorithms","author":"VV Vazirani","year":"2013","unstructured":"Vazirani, V. V. (2013). Approximation Algorithms. Heidelberg: Springer."},{"key":"6234_CR61","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., & Bengio, Y. (2018). Graph attention networks. arXiv:abs\/1710.10903."},{"key":"6234_CR62","unstructured":"Wang, X., Liu, X., & Hsieh, C.-J. (2019). Graphdefense: Towards robust graph convolutional networks. arXiv:abs\/1911.04429."},{"issue":"5","key":"6234_CR63","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1007\/s10618-020-00696-7","volume":"34","author":"J Wang","year":"2020","unstructured":"Wang, J., Luo, M., Suya, F., Li, J., Yang, Z., & Zheng, Q. (2020). Scalable attack on graph data by injecting vicious nodes. Data Mining and Knowledge Discovery, 34(5), 1363\u20131389.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6234_CR64","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, C., Tyshetskiy, Y., Docherty, A., Lu, K., & Zhu, L. (2019). Adversarial examples for graph data: Deep insights into attack and defense. In Kraus, S. (ed.) Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, (pp. 4816\u20134823).","DOI":"10.24963\/ijcai.2019\/669"},{"key":"6234_CR65","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2021","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., & Yu, P. S. (2021). A comprehensive survey on graph neural networks. IEEE Transactions on Neural Networks and Learning Systems, 32, 4\u201324.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"6234_CR66","doi-asserted-by":"crossref","unstructured":"Xu, K., Chen, H., Liu, S., Chen, P., Weng, T., Hong, M., & Lin, X. (2019). Topology attack and defense for graph neural networks: An optimization perspective. In Kraus, S. (ed.) Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019, (pp. 3961\u20133967).","DOI":"10.24963\/ijcai.2019\/550"},{"key":"6234_CR67","unstructured":"Xu, K., Li, C., Tian, Y., Sonobe, T., Kawarabayashi, K., & Jegelka, S. (2018). Representation learning on graphs with jumping knowledge networks. In: Dy, J.G., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning, ICML 2018, pp. 5449\u20135458."},{"key":"6234_CR68","doi-asserted-by":"crossref","unstructured":"Yan, D., Huang, L., & Jordan, M.I. (2009). Fast approximate spectral clustering. In IV, J.F.E., Fogelman-Souli\u00e9, F., Flach, P.A., Zaki, M.J. (eds.) Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (pp. 907\u2013916).","DOI":"10.1145\/1557019.1557118"},{"key":"6234_CR69","first-page":"1","volume":"2019","author":"L Yang","year":"2019","unstructured":"Yang, L., Liu, X., Nie, F., & Liu, M. (2019). Large-scale spectral clustering based on representative points. Mathematical Problems in Engineering, 2019, 1\u20137.","journal-title":"Mathematical Problems in Engineering"},{"key":"6234_CR70","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.patrec.2018.06.024","volume":"130","author":"X Yang","year":"2020","unstructured":"Yang, X., Yu, W., Wang, R., Zhang, G., & Nie, F. (2020). Fast spectral clustering learning with hierarchical bipartite graph for large-scale data. Pattern Recognition Letters, 130, 345\u2013352.","journal-title":"Pattern Recognition Letters"},{"key":"6234_CR71","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan, X., He, P., Zhu, Q., & Li, X. (2019). Adversarial examples: Attacks and defenses for deep learning. IEEE Transactions on Neural Networks and Learning Systems, 30, 2805\u20132824.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"6234_CR72","unstructured":"Zhang, Z., Cui, P., & Zhu, W. (2018). Deep learning on graphs: A survey. arXiv:abs\/1812.04202."},{"key":"6234_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, M., Hu, L., Shi, C., & Wang, X. (2020). Adversarial label-flipping attack and defense for graph neural networks. In Plant, C., Wang, H., Cuzzocrea, A., Zaniolo, C., Wu, X. (eds.) 20th IEEE International Conference on Data Mining, ICDM 2020, (pp. 791\u2013800).","DOI":"10.1109\/ICDM50108.2020.00088"},{"key":"6234_CR74","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Jia, J., Wang, B., & Gong, N.Z. (2021). Backdoor attacks to graph neural networks. In Lobo, J., Pietro, R.D., Chowdhury, O., Hu, H. (eds.) SACMAT \u201921: The 26th ACM Symposium on Access Control Models and Technologies, (pp. 15\u201326).","DOI":"10.1145\/3450569.3463560"},{"key":"6234_CR75","volume-title":"Machine learning","author":"Z-H Zhou","year":"2016","unstructured":"Zhou, Z.-H. (2016). Machine learning. Singapore: Springer."},{"key":"6234_CR76","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Cui, G., Hu, S., Zhang, Z., Yang, C., Liu, Z., et al. (2020). Graph neural networks: A review of methods and applications. AI Open, 1, 57\u201381.","journal-title":"AI Open"},{"key":"6234_CR77","doi-asserted-by":"crossref","unstructured":"Zhu, D., Zhang, Z., Cui, P., & Zhu, W. (2019). Robust graph convolutional networks against adversarial attacks. In Teredesai, A., Kumar, V., Li, Y., Rosales, R., Terzi, E., Karypis, G. (eds.) Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2019, (pp. 1399\u20131407).","DOI":"10.1145\/3292500.3330851"},{"key":"6234_CR78","doi-asserted-by":"crossref","unstructured":"Zou, X., Zheng, Q., Dong, Y., Guan, X., Kharlamov, E., Lu, J., & Tang, J. (2021). Tdgia: Effective injection attacks on graph neural networks. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, (pp. 2461\u20132471). Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/3447548.3467314"},{"key":"6234_CR79","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., & G\u00fcnnemann, S. (2019). Adversarial attacks on graph neural networks via meta learning. In 7th International Conference on Learning Representations, ICLR 2019.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"6234_CR80","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., & G\u00fcnnemann, S. (2019). Certifiable robustness and robust training for graph convolutional networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. KDD \u201919, pp. 246\u2013256. Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/3292500.3330905"},{"key":"6234_CR81","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., & G\u00fcnnemann, S. (2018). Adversarial attacks on neural networks for graph data. In Guo, Y., Farooq, F. (eds.) Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2018, (pp. 2847\u20132856).","DOI":"10.1145\/3219819.3220078"},{"key":"6234_CR82","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Borchert, O., Akbarnejad, A., & G\u00fcnnemann, S. (2020). Adversarial attacks on graph neural networks: Perturbations and their patterns. ACM Trans. Knowl. Discov. Data 14(5).","DOI":"10.1145\/3394520"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-022-06234-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-022-06234-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-022-06234-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T18:10:29Z","timestamp":1714673429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-022-06234-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,7]]},"references-count":82,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["6234"],"URL":"https:\/\/doi.org\/10.1007\/s10994-022-06234-4","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,7]]},"assertion":[{"value":"22 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}