{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T21:41:40Z","timestamp":1773870100012,"version":"3.50.1"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007928","name":"Ningbo Science and Technology Bureau","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007928","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.eswa.2026.131942","type":"journal-article","created":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:29:35Z","timestamp":1773188975000},"page":"131942","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Defending against link prediction by residual path entropy maximization"],"prefix":"10.1016","volume":"318","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1925-1430","authenticated-orcid":false,"given":"Ru","family":"Yuan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0540-5053","authenticated-orcid":false,"given":"Pietro","family":"Li\u00f2","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0403-0103","authenticated-orcid":false,"given":"Xu","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7445-2638","authenticated-orcid":false,"given":"Chengbin","family":"Peng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2026.131942_bib0001","unstructured":"Batagelj, V., & Mrvar, A. (2006). Pajek datasets [ol]. hup:\/\/vladojmJuni-lj.si\/pub\/networks\/data."},{"issue":"4","key":"10.1016\/j.eswa.2026.131942_bib0002","doi-asserted-by":"crossref","first-page":"18","DOI":"10.4169\/mathhorizons.23.4.18","article-title":"Network of thrones","volume":"23","author":"Beveridge","year":"2016","journal-title":"Math Horizons"},{"issue":"5916","key":"10.1016\/j.eswa.2026.131942_bib0003","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1126\/science.1165821","article-title":"Network analysis in the social sciences","volume":"323","author":"Borgatti","year":"2009","journal-title":"science"},{"issue":"4","key":"10.1016\/j.eswa.2026.131942_bib0004","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TCSS.2020.3004059","article-title":"Link prediction adversarial attack via iterative gradient attack","volume":"7","author":"Chen","year":"2020","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0005","series-title":"2017 International workshop on complex systems and networks (IWCSN)","first-page":"242","article-title":"Double layered recommendation algorithm based on fast density clustering: Case study on yelp social networks dataset","author":"Chen","year":"2017"},{"key":"10.1016\/j.eswa.2026.131942_bib0006","unstructured":"Chen, J., Wu, Y., Xu, X., Chen, Y., Zheng, H., & Xuan, Q. (2018). Fast gradient attack on network embedding. arXiv: 1809.02797."},{"issue":"1","key":"10.1016\/j.eswa.2026.131942_bib0007","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TNSE.2023.3301673","article-title":"Dyn-backdoor: Backdoor attack on dynamic link prediction","volume":"11","author":"Chen","year":"2024","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"10.1016\/j.eswa.2026.131942_bib0008","series-title":"International conference on machine learning","first-page":"1115","article-title":"Adversarial attack on graph structured data","author":"Dai","year":"2018"},{"key":"10.1016\/j.eswa.2026.131942_bib0009","series-title":"Proceedings of the 15th international conference on extending database technology","first-page":"109","article-title":"Limiting link disclosure in social network analysis through subgraph-wise perturbation","author":"Fard","year":"2012"},{"key":"10.1016\/j.eswa.2026.131942_bib0010","first-page":"4776","article-title":"How powerful are k-hop message passing graph neural networks","volume":"35","author":"Feng","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"4","key":"10.1016\/j.eswa.2026.131942_bib0011","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/0378-8733(95)00281-2","article-title":"The political network in mexico","volume":"18","author":"Gil-Mendieta","year":"1996","journal-title":"Social Networks"},{"issue":"04","key":"10.1016\/j.eswa.2026.131942_bib0012","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1142\/S0219525903001067","article-title":"Community structure in jazz","volume":"6","author":"Gleiser","year":"2003","journal-title":"Advances in Complex Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0013","series-title":"Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining","first-page":"855","article-title":"node2vec: Scalable feature learning for networks","author":"Grover","year":"2016"},{"issue":"6","key":"10.1016\/j.eswa.2026.131942_bib0014","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.68.065103","article-title":"Self-similar community structure in a network of human interactions","volume":"68","author":"Guimera","year":"2003","journal-title":"Physical Review E"},{"key":"10.1016\/j.eswa.2026.131942_bib0015","first-page":"180","article-title":"Anonymizing social networks","volume":"8","author":"Hay","year":"2009","journal-title":"Computer Science Department Faculty Publication Series"},{"issue":"5","key":"10.1016\/j.eswa.2026.131942_bib0016","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1511\/2006.61.3495","article-title":"Computing science: Connecting the dots","volume":"94","author":"Hayes","year":"2006","journal-title":"American Scientist"},{"key":"10.1016\/j.eswa.2026.131942_bib0017","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"282","article-title":"Hypergraph attacks via injecting homogeneous nodes into elite hyperedges","volume":"vol. 39","author":"He","year":"2025"},{"issue":"6","key":"10.1016\/j.eswa.2026.131942_bib0018","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TCSS.2019.2951330","article-title":"Behind the mask: Understanding the structural forces that make social graphs vulnerable to deanonymization","volume":"6","author":"Horawalavithana","year":"2019","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0019","series-title":"The web conference 2025","article-title":"Enhancing cross-domain link prediction via evolution process modeling","author":"Huang","year":"2025"},{"key":"10.1016\/j.eswa.2026.131942_bib0020","series-title":"Proceedings of the 5th ACM\/IEEE-CS joint conference on digital libraries","first-page":"141","article-title":"Link prediction approach to collaborative filtering","author":"Huang","year":"2005"},{"issue":"2","key":"10.1016\/j.eswa.2026.131942_bib0021","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1287\/ijoc.1080.0292","article-title":"The time-series link prediction problem with applications in communication surveillance","volume":"21","author":"Huang","year":"2009","journal-title":"INFORMS Journal on Computing"},{"issue":"11","key":"10.1016\/j.eswa.2026.131942_bib0022","doi-asserted-by":"crossref","first-page":"4959","DOI":"10.1007\/s13042-024-02198-0","article-title":"Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk","volume":"15","author":"Jiang","year":"2024","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"10.1016\/j.eswa.2026.131942_bib0023","unstructured":"Kipf, T. N., & Welling, M. (2016). Variational graph auto-encoders. arXiv: 1611.07308."},{"key":"10.1016\/j.eswa.2026.131942_bib0024","series-title":"The stanford graphbase: A platform for combinatorial computing","volume":"vol. 1","author":"Knuth","year":"1993"},{"key":"10.1016\/j.eswa.2026.131942_bib0025","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"13374","article-title":"Spear and shield: Adversarial attacks and defense methods for model-based link prediction on continuous-time dynamic graphs","volume":"vol. 38","author":"Lee","year":"2024"},{"key":"10.1016\/j.eswa.2026.131942_bib0026","first-page":"539","article-title":"Learning to discover social circles in ego networks","volume":"25","author":"Leskovec","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0027","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"26265","article-title":"Practicable black-box evasion attacks on link prediction in dynamic graphs\u2013a graph sequential embedding method","volume":"vol. 39","author":"Li","year":"2025"},{"key":"10.1016\/j.eswa.2026.131942_bib0028","article-title":"A semi-supervised privacy-preserving graph classification framework enhanced by graph contrastive learning","author":"Li","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2026.131942_bib0029","series-title":"Proceedings of the 33rd ACM international conference on information and knowledge management","first-page":"1316","article-title":"Privacy-preserving graph embedding based on local differential privacy","author":"Li","year":"2024"},{"key":"10.1016\/j.eswa.2026.131942_bib0030","series-title":"Proceedings of the 28th ACM SIGKDD conference on knowledge discovery and data mining","first-page":"989","article-title":"Graph structural attack by perturbing spectral distance","author":"Lin","year":"2022"},{"key":"10.1016\/j.eswa.2026.131942_bib0031","doi-asserted-by":"crossref","unstructured":"Long, Y., Xu, L., & Brintrup, A. (2025). Efficient and privacy-preserved link prediction via condensed graphs. arXiv: 2503.12156.","DOI":"10.2139\/ssrn.5185489"},{"key":"10.1016\/j.eswa.2026.131942_bib0032","series-title":"2025 IEEE symposium on security and privacy (SP)","first-page":"2095","article-title":"Grid: Protecting training graph from link stealing attacks on gnn models","author":"Lou","year":"2025"},{"key":"10.1016\/j.eswa.2026.131942_bib0033","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/s00265-003-0651-y","article-title":"The bottlenose dolphin community of doubtful sound features a large proportion of long-lasting associations: can geographic isolation explain this unique trait?","volume":"54","author":"Lusseau","year":"2003","journal-title":"Behavioral Ecology and Sociobiology"},{"key":"10.1016\/j.eswa.2026.131942_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122223","article-title":"Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems","volume":"238","author":"Macas","year":"2024","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.eswa.2026.131942_bib0035","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/TCSS.2018.2890483","article-title":"Detecting and mitigating points of failure in community networks: A graph-based approach","volume":"6","author":"Maccari","year":"2019","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0036","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s11280-013-0240-6","article-title":"Neighborhood randomization for link privacy in social network analysis","volume":"18","author":"Milani Fard","year":"2015","journal-title":"World Wide Web"},{"key":"10.1016\/j.eswa.2026.131942_bib0037","series-title":"Proceedings of the third ACM international conference on web search and data mining","first-page":"251","article-title":"You are who you know: inferring user profiles in online social networks","author":"Mislove","year":"2010"},{"issue":"3","key":"10.1016\/j.eswa.2026.131942_bib0038","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1006\/jtbi.2001.2460","article-title":"Small world patterns in food webs","volume":"214","author":"Montoya","year":"2002","journal-title":"Journal of Theoretical Biology"},{"issue":"3","key":"10.1016\/j.eswa.2026.131942_bib0039","article-title":"Finding community structure in networks using the eigenvectors of matrices","volume":"74","author":"Newman","year":"2006","journal-title":"Physical Review E\u2013Statistical, Nonlinear, and Soft Matter Physics"},{"key":"10.1016\/j.eswa.2026.131942_bib0040","series-title":"Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","first-page":"701","article-title":"Deepwalk: Online learning of social representations","author":"Perozzi","year":"2014"},{"key":"10.1016\/j.eswa.2026.131942_bib0041","series-title":"Information theory: From coding to learning","author":"Polyanskiy","year":"2025"},{"key":"10.1016\/j.eswa.2026.131942_bib0042","series-title":"2024 IEEE 40th international conference on data engineering (ICDE)","first-page":"1632","article-title":"Differentially private graph neural networks for link prediction","author":"Ran","year":"2024"},{"issue":"3","key":"10.1016\/j.eswa.2026.131942_bib0043","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"The Bell System Technical Journal"},{"key":"10.1016\/j.eswa.2026.131942_bib0044","series-title":"Proceedings of the 24th international conference on world wide web","first-page":"1067","article-title":"Line: Large-scale information network embedding","author":"Tang","year":"2015"},{"issue":"1","key":"10.1016\/j.eswa.2026.131942_bib0045","first-page":"1751","article-title":"Hitting and commute times in large random neighborhood graphs","volume":"15","author":"Von Luxburg","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"issue":"6887","key":"10.1016\/j.eswa.2026.131942_bib0046","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1038\/nature750","article-title":"Comparative assessment of large-scale data sets of protein\u2013protein interactions","volume":"417","author":"Von Mering","year":"2002","journal-title":"Nature"},{"issue":"3","key":"10.1016\/j.eswa.2026.131942_bib0047","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TCSS.2017.2738238","article-title":"Computational social systems in a new period: A fast transition into the third axial age","volume":"4","author":"Wang","year":"2017","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0048","series-title":"Proceedings of the 16th conference on autonomous agents and multiagent systems","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.65109\/OAHB8496","article-title":"On the construction of covert networks","author":"Waniek","year":"2017"},{"key":"10.1016\/j.eswa.2026.131942_bib0049","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.neucom.2020.07.126","article-title":"DeepEC: Adversarial attacks against graph structure prediction models","volume":"437","author":"Xian","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2026.131942_bib0050","series-title":"Proceedings of the thirty-eighth AAAI conference on artificial intelligence and thirty-sixth conference on innovative applications of artificial intelligence and fourteenth symposium on educational advances in artificial intelligence","article-title":"Teilp: time prediction over knowledge graphs via logical reasoning","author":"Xiong","year":"2024"},{"key":"10.1016\/j.eswa.2026.131942_bib0051","series-title":"Proceedings of the 21st ACM international conference on information and knowledge management","first-page":"2371","article-title":"Scalable collaborative filtering using incremental update and local link prediction","author":"Yang","year":"2012"},{"key":"10.1016\/j.eswa.2026.131942_bib0052","series-title":"Proceedings of the 2008 SIAM international conference on data mining","first-page":"739","article-title":"Randomizing social networks: A spectrum preserving approach","author":"Ying","year":"2008"},{"issue":"2","key":"10.1016\/j.eswa.2026.131942_bib0053","first-page":"754","article-title":"Target defense against link-prediction-based attacks via evolutionary perturbations","volume":"33","author":"Yu","year":"2019","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"10.1016\/j.eswa.2026.131942_bib0054","doi-asserted-by":"crossref","first-page":"1816","DOI":"10.1109\/TCSS.2023.3260833","article-title":"Link-backdoor: Backdoor attack on link prediction via node injection","volume":"11","author":"Zheng","year":"2023","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.eswa.2026.131942_bib0055","series-title":"2019 IEEE international conference on data mining (ICDM)","first-page":"926","article-title":"Adversarial robustness of similarity-based link prediction","author":"Zhou","year":"2019"},{"issue":"1","key":"10.1016\/j.eswa.2026.131942_bib0056","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TII.2022.3197190","article-title":"Attack and defense: Adversarial security of data-driven FDC systems","volume":"19","author":"Zhuo","year":"2022","journal-title":"IEEE Transactions on Industrial Informatics"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426008559?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426008559?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:20:11Z","timestamp":1773843611000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417426008559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":56,"alternative-id":["S0957417426008559"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131942","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Defending against link prediction by residual path entropy maximization","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131942","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"131942"}}