{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:53:50Z","timestamp":1773467630614,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007847","name":"Natural Science Foundation of Jilin Province","doi-asserted-by":"publisher","award":["20240101332JC"],"award-info":[{"award-number":["20240101332JC"]}],"id":[{"id":"10.13039\/100007847","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1109\/tbdata.2025.3630819","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T18:50:08Z","timestamp":1762800608000},"page":"525-535","source":"Crossref","is-referenced-by-count":0,"title":["Structure-Aware Attack on Graph Neural Networks via Imperceptible Node Injection"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8532-1978","authenticated-orcid":false,"given":"Fei","family":"Yan","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Changchun University of Science and Technology, Changchun, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8648-977X","authenticated-orcid":false,"given":"Yanlong","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Changchun University of Science and Technology, Changchun, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9335-9930","authenticated-orcid":false,"given":"Witold","family":"Pedrycz","sequence":"additional","affiliation":[{"name":"Department of Measurement and Control Systems, Silesian University of Technology, Gliwice, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5347-6182","authenticated-orcid":false,"given":"Kaoru","family":"Hirota","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3502733"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3266590"},{"key":"ref4","first-page":"5250","article-title":"Composition-based multi-relational graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Vashishth"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3115104"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3268683"},{"issue":"12","key":"ref7","article-title":"Composite graph neural networks for molecular property prediction","volume":"25","author":"Pietro","year":"2024","journal-title":"Int. J. Mol. Sci."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2022.102467"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3567420"},{"key":"ref10","first-page":"2991","article-title":"Adversarial attacks on graph neural networks via meta learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Z\u00fcgner"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3201243"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00138"},{"key":"ref15","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00088"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01200-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00696-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482393"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3361027"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467314"},{"key":"ref23","first-page":"15404","article-title":"Understanding and improving graph injection attack by promoting unnoticeability","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Chen"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3377554"},{"key":"ref26","first-page":"2713","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kipf"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.167"},{"key":"ref29","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref30","first-page":"2920","article-title":"Graph attention networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Veli\u010dkovi\u0107"},{"key":"ref31","first-page":"6861","article-title":"Simplifying graph convolutional networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441735"},{"key":"ref33","first-page":"9263","article-title":"GNNGuard: Defending graph neural networks against adversarial attacks","volume":"33","author":"Zhang","year":"2020","journal-title":"Neural Inf. Process. Syst."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3395794"},{"issue":"2605","key":"ref35","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_205410"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687317\/11433832\/11235979.pdf?arnumber=11235979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:00:39Z","timestamp":1773464439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11235979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2025.3630819","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4]]}}}