{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T19:56:21Z","timestamp":1770148581547,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:00:00Z","timestamp":1738108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:00:00Z","timestamp":1738108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61906104, 61502262"],"award-info":[{"award-number":["No. 61906104, 61502262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61906104, 61502262"],"award-info":[{"award-number":["No. 61906104, 61502262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61906104, 61502262"],"award-info":[{"award-number":["No. 61906104, 61502262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61906104, 61502262"],"award-info":[{"award-number":["No. 61906104, 61502262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61906104, 61502262"],"award-info":[{"award-number":["No. 61906104, 61502262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s13042-025-02545-9","type":"journal-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T13:08:55Z","timestamp":1738156135000},"page":"4817-4832","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Single node adversarial attack via reinforcement learning on non-target node features for graph neural networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Zhengli","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Chunyu","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Penghui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shiya","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Niuwangjie","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,29]]},"reference":[{"issue":"1","key":"2545_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Philip SY (2020) A comprehensive survey on graph neural networks. IEEE Trans Neural Netw Learn Syst 32(1):4\u201324","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"10","key":"2545_CR2","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s00607-023-01177-7","volume":"105","author":"R Tan","year":"2023","unstructured":"Tan R, Tan Q, Zhang Q, Zhang P, Xie Y, Li Z (2023) Ethereum fraud behavior detection based on graph neural networks. Computing 105(10):2143\u20132170","journal-title":"Computing"},{"issue":"10","key":"2545_CR3","doi-asserted-by":"publisher","first-page":"2311","DOI":"10.1007\/s00607-023-01185-7","volume":"105","author":"Y Zeng","year":"2023","unstructured":"Zeng Y, Yang B, Wen X, Li D (2023) Relevance-aware graph neural network for session-based recommendation. Computing 105(10):2311\u20132335","journal-title":"Computing"},{"issue":"5","key":"2545_CR4","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evolution Comput 23(5):828\u2013841","journal-title":"IEEE Trans Evolution Comput"},{"key":"2545_CR5","unstructured":"Dai H, Li H, Tian T, Huang X, Wang L, Zhu J, Song L (2018) Adversarial attack on graph structured data. In: International Conference on Machine Learning, pp. 1115\u20131124 . PMLR"},{"key":"2545_CR6","unstructured":"Sun Y, Wang S, Tang X, Hsieh T.-Y, Honavar V (2019) Node injection attacks on graphs via reinforcement learning. arXiv preprint arXiv:1909.06543"},{"key":"2545_CR7","doi-asserted-by":"crossref","unstructured":"Majadas R, Garc\u00eda J, Fern\u00e1ndez F (2024) Clustering-based attack detection for adversarial reinforcement learning. Applied Intelligence, 1\u201317","DOI":"10.1007\/s10489-024-05275-7"},{"key":"2545_CR8","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"2545_CR9","unstructured":"Goodfellow I.J, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"2545_CR10","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik Z.B, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387 . IEEE","DOI":"10.1109\/EuroSP.2016.36"},{"key":"2545_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2024.104506","volume":"149","author":"SG Pundkar","year":"2024","unstructured":"Pundkar SG, Gaikwad A (2024) Search and hunt based-driving scene perception network for distance estimation and object detection. Digital Signal Processing 149:104506","journal-title":"Digital Signal Processing"},{"key":"2545_CR12","doi-asserted-by":"crossref","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625\u20131634","DOI":"10.1109\/CVPR.2018.00175"},{"issue":"1","key":"2545_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Netw 20(1):61\u201380","journal-title":"IEEE Trans Neural Netw"},{"issue":"12","key":"2545_CR14","doi-asserted-by":"publisher","first-page":"7150","DOI":"10.3390\/app13127150","volume":"13","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Xu Y, Zhang Y (2023) A graph neural network node classification application model with enhanced node association. Appl Sci 13(12):7150","journal-title":"Appl Sci"},{"key":"2545_CR15","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner D, Akbarnejad A, G\u00fcnnemann S (2018) Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2847\u20132856","DOI":"10.1145\/3219819.3220078"},{"key":"2545_CR16","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu H, Ma Y, Liu H-C, Deb D, Liu H, Tang J-L, Jain AK (2020) Adversarial attacks and defenses in images, graphs and text: A review. Int J Autom Comput 17:151\u2013178","journal-title":"Int J Autom Comput"},{"key":"2545_CR17","doi-asserted-by":"crossref","unstructured":"Wu H, Wang C, Tyshetskiy Y, Docherty A, Lu K, Zhu L (2019) Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610","DOI":"10.24963\/ijcai.2019\/669"},{"issue":"8","key":"2545_CR18","first-page":"7693","volume":"35","author":"L Sun","year":"2022","unstructured":"Sun L, Dou Y, Yang C, Zhang K, Wang J, Philip SY, He L, Li B (2022) Adversarial attack and defense on graph data: A survey. IEEE Trans Knowl Data Eng 35(8):7693\u20137711","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2545_CR19","unstructured":"Z\u00fcgner D, G\u00fcnnemann S (2024) Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412v2"},{"key":"2545_CR20","unstructured":"Chen J, Wu Y, Xu X, Chen Y, Zheng H, Xuan Q (2018) Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797"},{"key":"2545_CR21","doi-asserted-by":"crossref","unstructured":"Takahashi T (2019) Indirect adversarial attacks via poisoning neighbors for graph convolutional networks. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 1395\u20131400 . IEEE","DOI":"10.1109\/BigData47090.2019.9006004"},{"key":"2545_CR22","doi-asserted-by":"crossref","unstructured":"Fang J, Wen H, Wu J, Xuan Q, Zheng Z, Chi K.T (2024) Gani: Global attacks on graph neural networks via imperceptible node injections. IEEE Transactions on Computational Social Systems","DOI":"10.1109\/TCSS.2024.3361027"},{"key":"2545_CR23","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1146\/annurev-control-053018-023825","volume":"2","author":"B Recht","year":"2019","unstructured":"Recht B (2019) A tour of reinforcement learning: The view from continuous control. Annu Rev Control Robot Auton Syst 2:253\u2013279","journal-title":"Annu Rev Control Robot Auton Syst"},{"key":"2545_CR24","unstructured":"Ma Y, Wang S, Derr T, Wu L, Tang J (2019) Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750"},{"key":"2545_CR25","doi-asserted-by":"crossref","unstructured":"Ju M, Fan Y, Zhang C, Ye Y (2023) Let graph be the go board: gradient-free node injection attack for graph neural networks via reinforcement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 4383\u20134390","DOI":"10.1609\/aaai.v37i4.25558"},{"key":"2545_CR26","unstructured":"Kipf T.N, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907"},{"key":"2545_CR27","first-page":"72","volume":"57","author":"J Lai","year":"2021","unstructured":"Lai J, Wei J, Chen X (2021) Overview of hierarchical reinforcement learning. Comput Eng Appl 57:72\u201379","journal-title":"Comput Eng Appl"},{"key":"2545_CR28","unstructured":"Lillicrap T.P, Hunt J.J, Pritzel A, Heess N, Erez T, Tassa Y, Silver D, Wierstra D (2015) Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971"},{"key":"2545_CR29","unstructured":"McCallum A, Nigam K (1998) A comparison of event models for naive bayes text classification. In: AAAI Workshop on Learning for Text Categorization"},{"issue":"1","key":"2545_CR30","first-page":"113","volume":"10","author":"B Shmueli","year":"2020","unstructured":"Shmueli B, Katz G, Rokach L (2020) Beyond the closed world: The current state of open-world learning for nlp. Appl Sci 10(1):113","journal-title":"Appl Sci"},{"key":"2545_CR31","doi-asserted-by":"crossref","unstructured":"Giles C.L, Bollacker K, Lawrence S (1998) Citeseer: An automatic citation indexing system. In: Proceedings of the Third ACM Conference on Digital Libraries, pp. 89\u201398","DOI":"10.1145\/276675.276685"},{"issue":"3","key":"2545_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1609\/aimag.v29i3.2157","volume":"29","author":"P Sen","year":"2008","unstructured":"Sen P, Namata G, Bilgic M, Getoor L, Galligher B, Eliassi-Rad T (2008) Collective classification in network data. AI Magazine 29(3):93\u2013106","journal-title":"AI Magazine"},{"issue":"20","key":"2545_CR33","first-page":"10","volume":"1050","author":"P Velickovic","year":"2017","unstructured":"Velickovic P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y et al (2017) Graph attention networks. Stat 1050(20):10\u201348550","journal-title":"Stat"},{"key":"2545_CR34","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Advances in neural information processing systems 30"},{"key":"2545_CR35","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao Y, Li Z, Cheng X, Wang Y, Kotevska O, Philip S.Y, Derr T (2024) A survey on privacy in graph neural networks: Attacks, preservation, and applications. IEEE Transactions on Knowledge and Data Engineering","DOI":"10.1109\/TKDE.2024.3454328"},{"issue":"26","key":"2545_CR36","doi-asserted-by":"publisher","first-page":"18851","DOI":"10.1007\/s00521-023-08839-9","volume":"35","author":"Z Zhai","year":"2023","unstructured":"Zhai Z, Li P, Feng S (2023) State of the art on adversarial attacks and defenses in graphs. Neural Comput Appl 35(26):18851\u201318872","journal-title":"Neural Comput Appl"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02545-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02545-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02545-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T04:00:21Z","timestamp":1757131221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02545-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,29]]},"references-count":36,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2545"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02545-9","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,29]]},"assertion":[{"value":"20 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any study with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}