{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:16:38Z","timestamp":1757618198914,"version":"3.44.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2020YFC1523300"],"award-info":[{"award-number":["2020YFC1523300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Project of Scientific Research Initiation Fund","award":["BS202454"],"award-info":[{"award-number":["BS202454"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s40747-025-01934-5","type":"journal-article","created":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:16:06Z","timestamp":1749269766000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Stealthy graph backdoor attack based on feature trigger"],"prefix":"10.1007","volume":"11","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhou","family":"Bin","sequence":"additional","affiliation":[]},{"given":"Haixing","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,7]]},"reference":[{"issue":"10","key":"1934_CR1","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.1109\/TC.2023.3271126","volume":"72","author":"L Alrahis","year":"2023","unstructured":"Alrahis L, Patnaik S, Hanif MA, Shafique M, Sinanoglu O (2023) $$\\texttt{PoisonedGNN}$$: Backdoor attack on graph neural networks-based hardware security systems. IEEE Transactions on Computers 72(10):2822\u20132834. https:\/\/doi.org\/10.1109\/TC.2023.3271126","journal-title":"IEEE Transactions on Computers"},{"doi-asserted-by":"crossref","unstructured":"Awasthi P, Das A, Gollapudi S (2022) Beyond gnns: An efficient architecture for graph problems. In: 36TH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, pp. 6019\u20136027","key":"1934_CR2","DOI":"10.1609\/aaai.v36i6.20548"},{"unstructured":"Bojchevski A, Guennemann S (2019) Adversarial attacks on node embeddings via graph poisoning. In: 36TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING, vol. 97","key":"1934_CR3"},{"issue":"1","key":"1934_CR4","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TNSE.2023.3301673","volume":"11","author":"J Chen","year":"2024","unstructured":"Chen J, Xiong H, Zheng H, Zhang J, Liu Y (2024) Dyn-backdoor: Backdoor attack on dynamic link prediction. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING 11(1):525\u2013542","journal-title":"IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING"},{"key":"1934_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/5418398","volume":"2023","author":"Y Chen","year":"2023","unstructured":"Chen Y, Ye Z, Zhao H, Wang Y (2023) Feature-based graph backdoor attack in the node classification task. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS 2023:1\u201313","journal-title":"INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS"},{"doi-asserted-by":"crossref","unstructured":"Chen S, Zhang C, Gu F, Wang H (2024) Rsgnn: residual structure graph neural network. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS","key":"1934_CR6","DOI":"10.1007\/s13042-024-02136-0"},{"doi-asserted-by":"crossref","unstructured":"Dai E, Lin M, Zhang X, Wang S (2023) Unnoticeable backdoor attacks on graph neural networks. In: PROCEEDINGS OF THE ACM WEB CONFERENCE 2023, pp. 2263\u20132273. ACM, ???","key":"1934_CR7","DOI":"10.1145\/3543507.3583392"},{"issue":"9","key":"1934_CR8","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1080\/01431169208904226","volume":"13","author":"S Danaher","year":"1992","unstructured":"Danaher S, Omongain E (1992) Singular value decomposition in multispectral radiometry. INTERNATIONAL JOURNAL OF REMOTE SENSING 13(9):1771\u20131777","journal-title":"INTERNATIONAL JOURNAL OF REMOTE SENSING"},{"doi-asserted-by":"crossref","unstructured":"Entezari N, Al-Sayouri SA, Darvishzadeh A, Papalexakis EE (2020) All you need is low (rank): Defending against adversarial attacks on graphs. In: The Thirteenth ACM International Conference on Web Search and Data Mining, pp. 169\u2013177. ACM, ???","key":"1934_CR9","DOI":"10.1145\/3336191.3371789"},{"key":"1934_CR10","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1109\/TIFS.2023.3346644","volume":"19","author":"L Fan","year":"2024","unstructured":"Fan L, He F, Si T, Fan R, Ye C, Li B (2024) Mba: Backdoor attacks against 3d mesh classifier. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 19:2127\u20132142","journal-title":"IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY"},{"key":"1934_CR11","doi-asserted-by":"publisher","first-page":"5655","DOI":"10.1109\/TIFS.2024.3402179","volume":"19","author":"W Fan","year":"2024","unstructured":"Fan W, Li H, Jiang W, Hao M, Yu S, Zhang X (2024) Stealthy targeted backdoor attacks against image captioning. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 19:5655\u20135667","journal-title":"IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY"},{"doi-asserted-by":"crossref","unstructured":"Giles CL, Bollacker KD, Lawrence S (1998) Citeseer: An automatic citation indexing system. In: PROCEEDINGS OF THE 3TH ACM CONFERENCE ON DIGITAL LIBRARIES, pp. 89\u201398","key":"1934_CR12","DOI":"10.1145\/276675.276685"},{"doi-asserted-by":"crossref","unstructured":"Gong S, Zhou J, Xie C, Xuan Q (2023) Neighborhood homophily-based graph convolutional network. In: PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 3908\u20133912","key":"1934_CR13","DOI":"10.1145\/3583780.3615195"},{"unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30","key":"1934_CR14"},{"doi-asserted-by":"crossref","unstructured":"He T, Liu Y, Ong Y-S, Wu X, Luo X (2024) Polarized message-passing in graph neural networks. ARTIFICIAL INTELLIGENCE 331","key":"1934_CR15","DOI":"10.1016\/j.artint.2024.104129"},{"doi-asserted-by":"crossref","unstructured":"Hussain H, Duricic T, Lex E, Helic D, Strohmaier M, Kern R (2021) Structack: Structure-based adversarial attacks on graph neural networks. In: 32ND ACM CONFERENCE ON HYPERTEXT AND SOCIAL MEDIA, pp. 111\u2013120. ACM, ???","key":"1934_CR16","DOI":"10.1145\/3465336.3475110"},{"doi-asserted-by":"crossref","unstructured":"Jiang C, He Y, Chapman R, Wu H (2022) Camouflaged poisoning attack on graph neural networks. In: INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, 451\u2013461. ACM, ???","key":"1934_CR17","DOI":"10.1145\/3512527.3531373"},{"unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","key":"1934_CR18"},{"unstructured":"Li Y, Jin W, Xu H, Tang J (2020) Deeprobust: A pytorch library for adversarial attacks and defenses. CoRR abs\/2005.06149","key":"1934_CR19"},{"doi-asserted-by":"crossref","unstructured":"Li M, Meng L, Ye Z, Xiao Y, Cao S, Zhao H (2024) Line graph contrastive learning for node classification. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 36(4)","key":"1934_CR20","DOI":"10.1016\/j.jksuci.2024.102011"},{"key":"1934_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3351762","author":"Y Liu","year":"2024","unstructured":"Liu Y, Du B (2024) Frequency domain-oriented complex graph neural networks for graph classification. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS. https:\/\/doi.org\/10.1109\/TNNLS.2024.3351762","journal-title":"IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS"},{"issue":"1","key":"1934_CR22","first-page":"784","volume":"35","author":"Z Liu","year":"2023","unstructured":"Liu Z, Fang Y, Liu Y, Zheng VWW (2023) Neighbor-anchoring adversarial graph neural networks. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 35(1):784\u2013795","journal-title":"IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING"},{"key":"1934_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06135-4","author":"Z Lu","year":"2024","unstructured":"Lu Z, Hu G, Wang L (2024) Order structure analysis of node importance based on the temporal inter-layer neighborhood homogeneity rate of the dynamic network. JOURNAL OF SUPERCOMPUTING. https:\/\/doi.org\/10.1007\/s11227-024-06135-4","journal-title":"JOURNAL OF SUPERCOMPUTING"},{"issue":"3","key":"1934_CR24","first-page":"58","volume":"41","author":"TT Nguyen","year":"2023","unstructured":"Nguyen TT, Quach NDK, Nguyen TT, Huynh TT, Vu VH, Nguyen PL, Jo J, Nguyen QVH (2023) Poisoning gnn-based recommender systems with generative surrogate-based attacks. ACM TRANSACTIONS ON INFORMATION SYSTEMS 41(3):58\u201315824","journal-title":"ACM TRANSACTIONS ON INFORMATION SYSTEMS"},{"doi-asserted-by":"crossref","unstructured":"Ren Q, Zheng Y, Yang C, Li Y, Ma J (2024) Shadow backdoor attack: Multi-intensity backdoor attack against federated learning. COMPUTERS & SECURITY 139","key":"1934_CR25","DOI":"10.1016\/j.cose.2024.103740"},{"key":"1934_CR26","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.neunet.2023.07.025","volume":"166","author":"AK Sharma","year":"2023","unstructured":"Sharma AK, Kukreja R, Kharbanda M, Chakraborty T (2023) Node injection for class-specific network poisoning. NEURAL NETWORKS 166:236\u2013247","journal-title":"NEURAL NETWORKS"},{"doi-asserted-by":"crossref","unstructured":"Sharma K, Verma S, Medya S, Bhattacharya A, Ranu S (2023) Task and model agnostic adversarial attack on graph neural networks. In: 37TH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, pp. 15091\u201315099","key":"1934_CR27","DOI":"10.1609\/aaai.v37i12.26761"},{"doi-asserted-by":"crossref","unstructured":"Takahashi T (2019) Indirect adversarial attacks via poisoning neighbors for graph convolutional networks. In: 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, pp. 1395\u20131400","key":"1934_CR28","DOI":"10.1109\/BigData47090.2019.9006004"},{"unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2017) Graph attention networks. arXiv preprint arXiv:1710.10903","key":"1934_CR29"},{"issue":"5","key":"1934_CR30","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TKDE.2023.3313059","volume":"36","author":"X Wang","year":"2024","unstructured":"Wang X, Chang H, Xie B, Bian T, Zhou S, Wang D, Zhang Z, Zhu W (2024) Revisiting adversarial attacks on graph neural networks for graph classification. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 36(5):2166\u20132178","journal-title":"IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING"},{"key":"1934_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110449","volume":"152","author":"K Wang","year":"2024","unstructured":"Wang K, Deng H, Xu Y, Liu Z, Fang Y (2024) Multi-target label backdoor attacks on graph neural networks. Pattern Recognition 152:110449. https:\/\/doi.org\/10.1016\/j.patcog.2024.110449","journal-title":"Pattern Recognition"},{"issue":"3","key":"1934_CR32","doi-asserted-by":"publisher","first-page":"3232","DOI":"10.1109\/TCSS.2024.3373633","volume":"11","author":"Z Xia","year":"2024","unstructured":"Xia Z, Zhang X, Liang L, Li Y, Gong Y (2024) Federated graph augmentation for semisupervised node classification. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS 11(3):3232\u20133242","journal-title":"IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS"},{"doi-asserted-by":"publisher","unstructured":"Xing X, Xu M, Bai Y, Yang D (2024) A clean-label graph backdoor attack method in node classification task. CoRR abs\/2401.00163 https:\/\/doi.org\/10.48550\/ARXIV.2401.00163","key":"1934_CR33","DOI":"10.48550\/ARXIV.2401.00163"},{"unstructured":"Xu K, Hu W, Leskovec J, Jegelka S (2019) How powerful are graph neural networks? In: 7TH INTERNATIONAL CONFERENCE ON LEARNING REPRESENTATIONS","key":"1934_CR34"},{"doi-asserted-by":"crossref","unstructured":"Xu J, Koffas S, Ersoy O, Picek S (2023) Watermarking graph neural networks based on backdoor attacks. In: IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS &P, pp. 1179\u20131197","key":"1934_CR35","DOI":"10.1109\/EuroSP57164.2023.00072"},{"doi-asserted-by":"crossref","unstructured":"Xu J, Picek S (2023) Poster: Multi-target & multi-trigger backdoor attacks on graph neural networks. In: PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 3570\u20133572","key":"1934_CR36","DOI":"10.1145\/3576915.3624387"},{"doi-asserted-by":"publisher","unstructured":"Xu J, Xue MJ, Picek S (2021) Explainability-based backdoor attacks against graph neural networks. In: PROCEEDINGS OF THE 3RD ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, 31\u201336 https:\/\/doi.org\/10.1145\/3468218.3469046","key":"1934_CR37","DOI":"10.1145\/3468218.3469046"},{"doi-asserted-by":"crossref","unstructured":"Yang S, Doan BG, Montague P, DeVel O (2022) Transferable graph backdoor attack. In: PROCEEDINGS OF THE 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 321\u2013332","key":"1934_CR38","DOI":"10.1145\/3545948.3545976"},{"unstructured":"Yang X, Li G, Li J (2024) Graph neural backdoor: Fundamentals, methodologies, applications, and future directions. CoRR abs\/2406.10573","key":"1934_CR39"},{"doi-asserted-by":"publisher","unstructured":"Yang D, Liu Z, Wang Y, Xu J, Yan W, Li R (2024) Adaptive multi-channel bayesian graph neural network. NEUROCOMPUTING 575 https:\/\/doi.org\/10.1016\/j.neucom.2024.127260","key":"1934_CR40","DOI":"10.1016\/j.neucom.2024.127260"},{"key":"1934_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-024-02170-y","author":"Y Yan","year":"2024","unstructured":"Yan Y, Li J, Xu S, Chen X, Liu G, Fu Y-G (2024) Lightcapsgnn: light capsule graph neural network for graph classification. KNOWLEDGE AND INFORMATION SYSTEMS. https:\/\/doi.org\/10.1007\/s10115-024-02170-y","journal-title":"KNOWLEDGE AND INFORMATION SYSTEMS"},{"doi-asserted-by":"crossref","unstructured":"Yao K-L, Li W-J (2024) Asymmetric learning for graph neural network based link prediction. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA 18(5)","key":"1934_CR42","DOI":"10.1145\/3640347"},{"issue":"3","key":"1934_CR43","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1587\/transfun.2023CIL0007","volume":"E107A","author":"S Yashiki","year":"2024","unstructured":"Yashiki S, Takahashi C, Suzuki K (2024) Backdoor attacks on graph neural networks trained with data augmentation. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E107A(3):355\u2013358","journal-title":"IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES"},{"doi-asserted-by":"publisher","unstructured":"Zhang X, Bao P, Pan S (2024) Maximizing malicious influence in node injection attack. In: PROCEEDINGS OF THE 17TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 958\u2013966 https:\/\/doi.org\/10.1145\/3616855.3635790","key":"1934_CR44","DOI":"10.1145\/3616855.3635790"},{"unstructured":"Zhang J, Hong Y, Zhang L, Zhao Q (2022) Large-scale adversarial attacks on graph neural networks via graph coarsening. In: 12TH INTERNATIONAL CONFERENCE ON LEARNING REPRESENTATIONS","key":"1934_CR45"},{"doi-asserted-by":"crossref","unstructured":"Zhang Z, Jia J, Wang B, Gong NZ (2021) Backdoor attacks to graph neural networks. In: THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, pp. 15\u201326. ACM, ???","key":"1934_CR46","DOI":"10.1145\/3450569.3463560"},{"doi-asserted-by":"publisher","unstructured":"Zhang Z, Lin M, Dai E, Wang S (2024) Rethinking graph backdoor attacks: A distribution-preserving perspective. In: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. KDD \u201924, pp. 4386\u20134397. Association for Computing Machinery, New York, NY, USA https:\/\/doi.org\/10.1145\/3637528.3671910","key":"1934_CR47","DOI":"10.1145\/3637528.3671910"},{"issue":"6","key":"1934_CR48","doi-asserted-by":"publisher","first-page":"1586","DOI":"10.1109\/TBDATA.2023.3296936","volume":"9","author":"S Zhao","year":"2023","unstructured":"Zhao S, Wang W, Du Z, Chen J, Duan Z (2023) A black-box adversarial attack method via nesterov accelerated gradient and rewiring towards attacking graph neural networks. IEEE TRANSACTIONS ON BIG DATA 9(6):1586\u20131597. https:\/\/doi.org\/10.1109\/TBDATA.2023.3296936","journal-title":"IEEE TRANSACTIONS ON BIG DATA"},{"issue":"7","key":"1934_CR49","doi-asserted-by":"publisher","first-page":"12102","DOI":"10.1109\/JIOT.2023.3332848","volume":"11","author":"X Zhao","year":"2024","unstructured":"Zhao X, Wu H, Zhang X (2024) Effective backdoor attack on graph neural networks in spectral domain. IEEE INTERNET OF THINGS JOURNAL 11(7):12102\u201312114","journal-title":"IEEE INTERNET OF THINGS JOURNAL"},{"issue":"7","key":"1934_CR50","doi-asserted-by":"publisher","first-page":"12102","DOI":"10.1109\/JIOT.2023.3332848","volume":"11","author":"X Zhao","year":"2024","unstructured":"Zhao X, Wu H, Zhang X (2024) Effective backdoor attack on graph neural networks in spectral domain. IEEE Internet of Things Journal 11(7):12102\u201312114. https:\/\/doi.org\/10.1109\/JIOT.2023.3332848","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"1934_CR51","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1109\/TCSS.2023.3267094","volume":"11","author":"H Zheng","year":"2024","unstructured":"Zheng H, Xiong H, Chen J, Ma H, Huang G (2024) Motif-backdoor: Rethinking the backdoor attack on graph neural networks via motifs. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS 11(2):2479\u20132493. https:\/\/doi.org\/10.1109\/TCSS.2023.3267094","journal-title":"IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS"},{"issue":"2","key":"1934_CR52","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1109\/TCSS.2023.3260833","volume":"11","author":"H Zheng","year":"2024","unstructured":"Zheng H, Xiong H, Ma H, Huang G, Chen J (2024) Link-backdoor: Backdoor attack on link prediction via node injection. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS 11(2):1816\u20131831","journal-title":"IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS"},{"doi-asserted-by":"crossref","unstructured":"Z\u00fcgner D, Akbarnejad A, G\u00fcnnemann S (2018) Adversarial attacks on neural networks for graph data. PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2847\u20132856","key":"1934_CR53","DOI":"10.1145\/3219819.3220078"},{"doi-asserted-by":"crossref","unstructured":"Z\u00fcgner D, G\u00fcnnemann S (2019) Adversarial attacks on graph neural networks via meta learning. In: 7TH INTERNATIONAL CONFERENCE ON LEARNING REPRESENTATIONS. OpenReview.net, ???","key":"1934_CR54","DOI":"10.24963\/ijcai.2019\/872"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01934-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01934-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01934-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:40:34Z","timestamp":1757187634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01934-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,7]]},"references-count":54,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1934"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01934-5","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,6,7]]},"assertion":[{"value":"23 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"325"}}