{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:48:44Z","timestamp":1773154124139,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072406"],"award-info":[{"award-number":["62072406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62103374"],"award-info":[{"award-number":["62103374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Ministry of Public Security","award":["2020DSJSYS001"],"award-info":[{"award-number":["2020DSJSYS001"]}]},{"name":"Key Research and Development Projects in Zhejiang Province","award":["2021C01117"],"award-info":[{"award-number":["2021C01117"]}]},{"name":"2020 Industrial Internet Innovation Development Project","award":["TC200H01V"],"award-info":[{"award-number":["TC200H01V"]}]},{"name":"\u201cTen Thousand Talents Program\u201d in Zhejiang Province","award":["2020R52011"],"award-info":[{"award-number":["2020R52011"]}]},{"DOI":"10.13039\/501100017577","name":"Basic Public Welfare Research Project of Zhejiang Province","doi-asserted-by":"publisher","award":["LGF20F020016"],"award-info":[{"award-number":["LGF20F020016"]}],"id":[{"id":"10.13039\/501100017577","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project of the Key Laboratory of Public Security Informatization Application Based on Big Data Architecture","award":["2020DSJSYS003"],"award-info":[{"award-number":["2020DSJSYS003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/tcss.2022.3161016","type":"journal-article","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T19:52:27Z","timestamp":1648669947000},"page":"492-506","source":"Crossref","is-referenced-by-count":36,"title":["Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-2755","authenticated-orcid":false,"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2850-6268","authenticated-orcid":false,"given":"Guohan","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8997-5343","authenticated-orcid":false,"given":"Haibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5170-8082","authenticated-orcid":false,"given":"Shanqing","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Wenrong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Zhejiang Police College, Big Data and Cyber Security Research Institute, Hangzhou, China"}]},{"given":"Chen","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Computer Science, Hangzhou Dianzi University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2016","journal-title":"arXiv:1602.05629"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref3","article-title":"Applied federated learning: Improving Google keyboard query suggestions","author":"Yang","year":"2018","journal-title":"arXiv:1812.02903"},{"key":"ref4","article-title":"FedNER: Privacy-preserving medical named entity recognition with federated learning","author":"Ge","year":"2020","journal-title":"arXiv:2003.09288"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2021.05.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691319500322"},{"key":"ref8","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv:1610.02527"},{"key":"ref9","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref10","first-page":"4615","article-title":"Agnostic federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mohri"},{"key":"ref11","first-page":"7252","article-title":"Bayesian nonparametric federated learning of neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yurochkin"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412771"},{"key":"ref13","article-title":"ASFGNN: Automated separated-federated graph neural network","author":"Zheng","year":"2020","journal-title":"arXiv:2011.03248"},{"key":"ref14","article-title":"GraphFL: A federated learning framework for semi-supervised node classification on graphs","author":"Wang","year":"2020","journal-title":"arXiv:2012.04187"},{"key":"ref15","article-title":"FedGraphNN: A federated learning system and benchmark for graph neural networks","author":"He","year":"2021","journal-title":"arXiv:2104.07145"},{"key":"ref16","article-title":"Vertically federated graph neural network for privacy-preserving node classification","author":"Zhou","year":"2020","journal-title":"arXiv:2005.11903"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2106.11593"},{"key":"ref18","article-title":"FedGNN: Federated graph neural network for privacy-preserving recommendation","author":"Wu","year":"2021","journal-title":"arXiv:2102.04925"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref22","article-title":"Feature inference attack on model predictions in vertical federated learning","author":"Luo","year":"2020","journal-title":"arXiv:2010.10152"},{"key":"ref23","article-title":"Privacy-preserving federated learning on partitioned attributes","author":"Zhang","year":"2021","journal-title":"arXiv:2104.14383"},{"key":"ref24","article-title":"Label leakage and protection in two-party split learning","author":"Li","year":"2021","journal-title":"arXiv:2102.08504"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3448614"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651917"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/872"},{"key":"ref28","article-title":"Adversarial attack on graph structured data","author":"Dai","year":"2018","journal-title":"arXiv:1806.02371"},{"key":"ref29","article-title":"Fast gradient attack on network embedding","author":"Chen","year":"2018","journal-title":"arXiv:1809.02797"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3078755"},{"key":"ref32","article-title":"Attack graph convolutional networks by adding fake nodes","author":"Wang","year":"2018","journal-title":"arXiv:1810. 10751"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref34","article-title":"Attacking graph convolutional networks via rewiring","author":"Ma","year":"2019","journal-title":"arXiv:1906.03750"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2912801"},{"key":"ref36","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"issue":"2","key":"ref37","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1023\/A:1009953814988","article-title":"Automating the construction of internet portals with machine learning","volume":"3","author":"McCallum","year":"2000","journal-title":"Inf. Retr."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"ref40","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016","journal-title":"arXiv:1609.02907"},{"key":"ref41","first-page":"6861","article-title":"Simplifying graph convolutional networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59410-7_33"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10089892\/09745270.pdf?arnumber=9745270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:01:32Z","timestamp":1705536092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9745270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":44,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2022.3161016","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}