{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:53:31Z","timestamp":1770540811113,"version":"3.49.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3100600"],"award-info":[{"award-number":["2021YFB3100600"]}]},{"name":"CAS Project for Young Scientists in Basic Research","award":["YSBR-008"],"award-info":[{"award-number":["YSBR-008"]}]},{"name":"Alibaba Innovative Research Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tkde.2024.3403925","type":"journal-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T17:28:33Z","timestamp":1716571713000},"page":"6344-6357","source":"Crossref","is-referenced-by-count":8,"title":["Graph Structure Reshaping Against Adversarial Attacks on Graph Neural Networks"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1459-8037","authenticated-orcid":false,"given":"Haibo","family":"Wang","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9958-8673","authenticated-orcid":false,"given":"Chuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6507-953X","authenticated-orcid":false,"given":"Xin","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-5801","authenticated-orcid":false,"given":"Jia","family":"Wu","sequence":"additional","affiliation":[{"name":"Faculty of Science and Engineering, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-527X","authenticated-orcid":false,"given":"Shirui","family":"Pan","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5056-0351","authenticated-orcid":false,"given":"Zhao","family":"Li","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4493-5145","authenticated-orcid":false,"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3491-5968","authenticated-orcid":false,"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2020.2978386"},{"key":"ref2","article-title":"Deep learning on graphs: A survey","author":"Zhang","year":"2018"},{"key":"ref3","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"ref4","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref5","article-title":"Diffusion convolutional recurrent neural network: Data-driven traffic forecasting","author":"Li","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"ref7","first-page":"1263","article-title":"Neural message passing for quantum chemistry","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Gilmer"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref9","article-title":"Adversarial attacks on graph neural networks via meta learning","author":"Z\u00fcgner","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref12","article-title":"Adversarial attack on graph structured data","author":"Dai","year":"2018"},{"key":"ref13","first-page":"8317","article-title":"Certifiable robustness to graph perturbations","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bojchevski"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"ref15","article-title":"Power up! robust graph convolutional network against evasion attacks based on graph powering","author":"Jin","year":"2019"},{"key":"ref16","article-title":"Robust graph neural network against poisoning attacks via transfer learning","author":"Tang","year":"2019"},{"key":"ref17","article-title":"GNNguard: Defending graph neural networks against adversarial attacks","author":"Zhang","year":"2020"},{"key":"ref18","first-page":"19839","article-title":"Graph stochastic neural networks for semi-supervised learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref19","article-title":"Characterizing malicious edges targeting on graph neural networks","author":"Xu","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403177"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref25","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref26","first-page":"2579","article-title":"Visualizing data using T-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"ref27","article-title":"Deep graph infomax","volume":"2","author":"Velickovic","year":"2019","journal-title":"ICLR (Poster)"},{"key":"ref28","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107","year":"2017"},{"key":"ref29","article-title":"Spectral networks and locally connected networks on graphs","author":"Bruna","year":"2013"},{"key":"ref30","article-title":"Deep convolutional networks on graph-structured data","author":"Henaff","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1606.09375"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2879624"},{"key":"ref33","first-page":"2014","article-title":"Learning convolutional neural networks for graphs","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Niepert"},{"key":"ref34","first-page":"1993","article-title":"Diffusion-convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Atwood"},{"key":"ref35","article-title":"How powerful are graph neural networks?","author":"Xu","year":"2018"},{"key":"ref36","article-title":"GaAN: Gated attention networks for learning on large and spatiotemporal graphs","author":"Zhang","year":"2018"},{"key":"ref37","article-title":"Representation learning on graphs with jumping knowledge networks","author":"Xu","year":"2018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.11"},{"key":"ref39","article-title":"GMNN: Graph Markov neural networks","author":"Qu","year":"2019"},{"key":"ref40","first-page":"7548","article-title":"Graph geometry interaction learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhu"},{"key":"ref41","article-title":"Fast gradient attack on network embedding","author":"Chen","year":"2018"},{"key":"ref42","article-title":"Attacking graph convolutional networks via rewiring","author":"Ma","year":"2019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484796"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"},{"key":"ref45","article-title":"Efficient evasion attacks to graph neural networks via influence function","author":"Wang","year":"2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467295"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380029"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10709365\/10538390.pdf?arnumber=10538390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:41:28Z","timestamp":1728452488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10538390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":48,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3403925","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}