{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:23Z","timestamp":1773511163969,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2022YFB3103700"],"award-info":[{"award-number":["2022YFB3103700"]}]},{"name":"National Key R&amp;D Program of China","award":["2022YFB3103701"],"award-info":[{"award-number":["2022YFB3103701"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102402"],"award-info":[{"award-number":["62102402"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272125"],"award-info":[{"award-number":["62272125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2046"],"award-info":[{"award-number":["U21B2046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Academy of Artificial Intelligence"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tkde.2023.3311105","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T17:34:15Z","timestamp":1693589655000},"page":"1597-1610","source":"Crossref","is-referenced-by-count":7,"title":["Graph Adversarial Immunization for Certifiable Robustness"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6113-6145","authenticated-orcid":false,"given":"Shuchang","family":"Tao","sequence":"first","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3454-4789","authenticated-orcid":false,"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1081-8119","authenticated-orcid":false,"given":"Huawei","family":"Shen","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6994-6791","authenticated-orcid":false,"given":"Yunfan","family":"Wu","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4904-5694","authenticated-orcid":false,"given":"Liang","family":"Hou","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5201-8195","authenticated-orcid":false,"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kipf"},{"key":"ref2","article-title":"Predict then propagate: Graph neural networks meet personalized PageRank","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Klicpera"},{"key":"ref3","article-title":"Graph wavelet neural network","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xu"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371834"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313488"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2021.3118815"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"key":"ref8","first-page":"1123","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref10","first-page":"695","article-title":"Adversarial attacks on node embeddings via graph poisoning","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bojchevski"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482393"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467314"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2957786"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313445"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00016"},{"key":"ref16","first-page":"9263","article-title":"GNNGuard: Defending graph neural networks against adversarial attacks","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"ref18","article-title":"Comparing and detecting adversarial attacks for graph deep learning","volume-title":"Proc. Representation Learn. Graphs Manifolds Workshop","author":"Zhang","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"ref23","first-page":"8319","article-title":"Certifiable robustness to graph perturbations","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Bojchevski"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403217"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401087"},{"key":"ref26","article-title":"Adversarial attacks on graph neural networks via meta learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Z\u00fcgner"},{"key":"ref27","first-page":"11647","article-title":"Efficient robustness certificates for discrete data: Sparsity-aware randomized smoothing for graphs, images and more","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Bojchevski"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467295"},{"key":"ref29","article-title":"Collective robustness certificates: Exploiting interdependence in graph neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Schuchardt"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3447556.3447566"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441782"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00696-7"},{"key":"ref34","article-title":"Graph attention networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Veli\u010dkovi\u0107"},{"key":"ref35","article-title":"The pagerank citation ranking : Bringing order to the web","volume-title":"Proc. Web Conf.","author":"Page","year":"1999"},{"key":"ref36","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Finn"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmr.2011.07.023"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"ref39","article-title":"GraphSAINT: Graph sampling based inductive learning method","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zeng"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2024.3369017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330905"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3201243"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref45","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref46","first-page":"5448","article-title":"A persistent Weisfeiler-Lehman procedure for graph classification","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Rieck"},{"key":"ref47","article-title":"A survey of adversarial learning on graphs","author":"Chen","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3219209"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3394520"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3078755"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3153060"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512180"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015829"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371851"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380029"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10462568\/10237327.pdf?arnumber=10237327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T18:31:24Z","timestamp":1725647484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10237327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":57,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2023.3311105","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}