{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T05:17:15Z","timestamp":1670563035975},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"NSF","award":["1939725","1947135","2003924"],"award-info":[{"award-number":["1939725","1947135","2003924"]}]},{"name":"Agriculture and Food Research Initiative AFRI","award":["2020-67021- 32799"],"award-info":[{"award-number":["2020-67021- 32799"]}]},{"DOI":"10.13039\/100005825","name":"USDA National Institute of Food and Agriculture","doi-asserted-by":"crossref","award":["1024178"],"award-info":[{"award-number":["1024178"]}],"id":[{"id":"10.13039\/100005825","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tkde.2021.3078634","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T21:47:02Z","timestamp":1620683222000},"page":"1-1","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Attacks on Multi-Network Mining: Problem Definition and Fast Solutions"],"prefix":"10.1109","author":[{"given":"Qinghai","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Liangyue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Hanghang","family":"Tong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref38","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2017"},{"key":"ref33","first-page":"1893","article-title":"Data poisoning attacks on factorization-based collaborative filtering","author":"li","year":"2016","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186113"},{"key":"ref31","first-page":"1819","article-title":"Extra: Explaining team recommendation in networks","author":"zhou","year":"0","journal-title":"Proc Conf Recommender Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269276"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref36","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref34","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220002"},{"key":"ref40","article-title":"Adversarial attacks on graph neural networks via meta learning","author":"z\u00fcgner","year":"2019","journal-title":"Int Conf Learn Representations"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177692459"},{"key":"ref12","article-title":"Understanding black-box predictions via influence functions","author":"koh","year":"2017"},{"key":"ref13","article-title":"The matrix cookbook","author":"petersen","year":"2012"},{"key":"ref14","article-title":"The ordered weighted $l_1$l1 norm: Atomic formulation, dual norm, and projections","author":"zeng","year":"2014","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1021\/jm040835a"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1021\/ci034143r"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783417"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"ref19","first-page":"1999","article-title":"The pagerank citation ranking: Bringing order to the web","author":"page","year":"1999"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.104"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098040"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623643"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741132"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939766"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783262"},{"key":"ref5","first-page":"1201","article-title":"Graph kernels","volume":"11","author":"vishwanathan","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/146847.146929"},{"key":"ref7","first-page":"1449","article-title":"Fast computation of graph kernels","author":"borgwardt","year":"2007","journal-title":"Proc 19th Int Conf Neural Inf Process Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505531"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.160"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti1007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.132"},{"key":"ref22","first-page":"2539","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"shervashidze","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref21","first-page":"488","article-title":"Efficient graphlet kernels for large graph comparison","volume":"5","author":"shervashidze","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1021\/ci050039t"},{"key":"ref41","first-page":"1115","article-title":"Adversarial attack on graph structured data","author":"dai","year":"2018","journal-title":"Proc 35th Int Conf Mach Learn"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014072"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.30"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/4358933\/09427250.pdf?arnumber=9427250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T15:28:38Z","timestamp":1670513318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9427250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/tkde.2021.3078634","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}