{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T23:32:39Z","timestamp":1773099159941,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876001"],"award-info":[{"award-number":["61876001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation for the Higher Education Institutions of Anhui Province of China","award":["KJ2021A0039"],"award-info":[{"award-number":["KJ2021A0039"]}]},{"name":"Provincial Graduate Academic Innovation Program"},{"name":"Beijing Academy of Artificial Intelligence"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tbdata.2023.3296936","type":"journal-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T21:05:27Z","timestamp":1689800727000},"page":"1586-1597","source":"Crossref","is-referenced-by-count":22,"title":["A Black-Box Adversarial Attack Method via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural Networks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7647-3603","authenticated-orcid":false,"given":"Shu","family":"Zhao","sequence":"first","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2559-4399","authenticated-orcid":false,"given":"Wenyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1278-8942","authenticated-orcid":false,"given":"Ziwei","family":"Du","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6474-9238","authenticated-orcid":false,"given":"Jie","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0252-4956","authenticated-orcid":false,"given":"Zhen","family":"Duan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref3","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref4","article-title":"Graph attention networks","volume":"1050","author":"Velickovic","year":"2017","journal-title":"Stat"},{"key":"ref5","first-page":"5171","article-title":"Link prediction based on graph neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498429"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3117274"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref9","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3207915"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539435"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482393"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/14697688.2019.1622295"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.drudis.2020.12.003"},{"key":"ref15","article-title":"Fast gradient attack on network embedding","author":"Chen","year":"2018"},{"key":"ref16","article-title":"Adversarial attacks on graph neural networks via meta learning","volume-title":"Proc. Adv. 7th Int. Conf. Learn. Representations","author":"Z\u00fcgner"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557238"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00175354"},{"issue":"1","key":"ref19","first-page":"103","article-title":"Reinforcement learning: An introduction","volume":"21","author":"Thrun","year":"2000","journal-title":"AI Mag."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467416"},{"key":"ref22","article-title":"Can adversarial network attack be defended?","author":"Chen","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2023.08.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209981"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref27","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Lin"},{"key":"ref28","first-page":"543","article-title":"A method for unconstrained convex minimization problem with the rate of convergence o (1\/k^2)","volume":"269","author":"Nesterov","year":"1983","journal-title":"Doklady AN USSR"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00138"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3031058"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006004"},{"key":"ref34","article-title":"Data poisoning attack against unsupervised node embedding methods","author":"Sun","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2912801"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3110580"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498481"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00696-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"ref40","first-page":"695","article-title":"Adversarial attacks on node embeddings via graph poisoning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bojchevski"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20350"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01302"},{"key":"ref43","article-title":"Black-box adversarial attacks on graph neural networks with limited node access","author":"Ma","year":"2020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00149"},{"key":"ref45","article-title":"A survey of adversarial learning on graphs","author":"Chen","year":"2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/674"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00006"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3512527.3531373"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3567420"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3219209"},{"key":"ref52","article-title":"Efficient evasion attacks to graph neural networks via influence function","author":"Wang","year":"2020"},{"key":"ref53","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Representations","author":"Kipf"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729586"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2020.10.3.953"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(98)00116-6"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"ref58","article-title":"Deep gaussian embedding of graphs: Unsupervised inductive learning via ranking","author":"Bojchevski","year":"2017"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441735"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10314842\/10187620.pdf?arnumber=10187620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T14:58:16Z","timestamp":1709305096000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10187620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":60,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2023.3296936","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}