{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:49:19Z","timestamp":1775144959470,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2023YFB3107500"],"award-info":[{"award-number":["2023YFB3107500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62220106004"],"award-info":[{"award-number":["62220106004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232013"],"award-info":[{"award-number":["62232013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Innovation Leading Program of Shaanxi","award":["2022KXJ-093"],"award-info":[{"award-number":["2022KXJ-093"]}]},{"name":"Technology Innovation Leading Program of Shaanxi","award":["2023KXJ-033"],"award-info":[{"award-number":["2023KXJ-033"]}]},{"name":"Innovation Capability Support Program of Shaanxi","award":["2023-CX-TD-02"],"award-info":[{"award-number":["2023-CX-TD-02"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZDRC2202"],"award-info":[{"award-number":["ZDRC2202"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Applied Basic Research Foundation of Guangdong Province","award":["2023TQ07A264"],"award-info":[{"award-number":["2023TQ07A264"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tdsc.2025.3543020","type":"journal-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T13:27:39Z","timestamp":1739885259000},"page":"4053-4069","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive Backdoor Attacks With Reasonable Constraints on Graph Neural Networks"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5745-0545","authenticated-orcid":false,"given":"Xuewen","family":"Dong","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, Xidian University, Xi&#x2019;an, China"}]},{"given":"Jiachen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5628-7328","authenticated-orcid":false,"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing &amp; Institute of Cyber Security for Society (iCSS), University of Kent, Canterbury, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3683-407X","authenticated-orcid":false,"given":"Zhichao","family":"You","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Engineering Research Center of Blockchain Technology Application and Evaluation, Ministry of Education, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5814-8460","authenticated-orcid":false,"given":"Qiang","family":"Qu","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yaroslav","family":"Kholodov","sequence":"additional","affiliation":[{"name":"Intelligent Transportation Systems Lab, Innopolis University, Innopolis, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-705X","authenticated-orcid":false,"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2880981"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1021\/ci3001277"},{"key":"ref3","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref4","first-page":"2713","article-title":"Semi-supervised Classification with graph convolutional networks","volume-title":"Proc. 2017 Int. Conf. Learn. Representations","author":"Kipf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3108782"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006464"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1021\/acscentsci.6b00367"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23226"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.33969\/J-NaNA.2022.020404"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.33969\/J-NaNA.2022.020405"},{"key":"ref12","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3211955"},{"key":"ref16","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3153844"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469046"},{"key":"ref20","first-page":"1523","article-title":"Graph backdoor","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Xi"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583392"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3371592"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3370918"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109874"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3183143"},{"key":"ref26","first-page":"9244","article-title":"GNNExplainer: Generating explanations for graph neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ying"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3187455"},{"key":"ref28","first-page":"40 888","article-title":"Graph contrastive backdoor attacks","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref29","article-title":"Representation learning on graphs: Methods and applications","author":"Hamilton","year":"2017"},{"key":"ref30","first-page":"2920","article-title":"Graph attention networks","volume-title":"Proc. 2018 Int. Conf. Learn. Representations","author":"Veli\u010dkovi\u0107"},{"key":"ref31","first-page":"4805","article-title":"Hierarchical graph representation learning with differentiable pooling","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ying"},{"key":"ref32","first-page":"4914","article-title":"Countering adversarial images using input transformations","volume-title":"Proc. 2018 Int. Conf. Learn. Representations","author":"Guo"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbac231"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jcim.3c00273"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358106"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3464764"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89689-0_33"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti1007"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_20"},{"key":"ref42","first-page":"40","article-title":"Revisiting semi-supervised learning with graph embeddings","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","author":"Yang"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00056"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11077775\/10891609.pdf?arnumber=10891609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:58:00Z","timestamp":1770843480000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10891609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3543020","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}