{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:53:28Z","timestamp":1767678808715,"version":"3.48.0"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472317"],"award-info":[{"award-number":["62472317"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities and the Shanghai Science and Technology Innovation Action Plan Project","award":["22YS1400600"],"award-info":[{"award-number":["22YS1400600"]}]},{"name":"Fundamental Research Funds for the Central Universities and the Shanghai Science and Technology Innovation Action Plan Project","award":["24692118300"],"award-info":[{"award-number":["24692118300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tkde.2025.3640634","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:40:22Z","timestamp":1764960022000},"page":"969-982","source":"Crossref","is-referenced-by-count":0,"title":["Defending Attacks on Anti-Fraud Model With Generative Graph Representations"],"prefix":"10.1109","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6794-9425","authenticated-orcid":false,"given":"Jiasheng","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Xincheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5877-7387","authenticated-orcid":false,"given":"Dawei","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Guang","family":"Yang","sequence":"additional","affiliation":[{"name":"WeChat Pay, Tencent Inc., Shenzhen, China"}]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"WeChat Pay, Tencent Inc., Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/joes.12294"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116429"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2021.100402","article-title":"Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019","volume":"40","author":"Al-Hashedi","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2025.3530467"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2025.3543887"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"},{"key":"ref8","first-page":"1","article-title":"How powerful are graph neural networks?","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xu","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26702"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/839"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5572-1_26"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3542608"},{"year":"2024","key":"ref16","article-title":"Crimeware and financial cyberthreats in 2025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.115"},{"article-title":"Graphdefense: Towards robust graph convolutional networks","year":"2019","author":"Wang","key":"ref18"},{"key":"ref19","first-page":"9263","article-title":"Gnnguard: Defending graph neural networks against adversarial attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3172296"},{"key":"ref21","first-page":"7637","article-title":"Robustness of graph neural networks at scale","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Geisler"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30098"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121171"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20362"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3394520"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3616855.3635826"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3219209"},{"key":"ref29","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sutskever"},{"key":"ref30","first-page":"1724","article-title":"Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation","volume-title":"Proc. 2014 Conf. Empirical Methods Natural Lang. Process.","author":"Cho","year":"2014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"article-title":"Auto-encoding variational bayes","year":"2013","author":"Kingma","key":"ref34"},{"key":"ref35","first-page":"52","article-title":"Representation learning on graphs: Methods and applications","volume":"40","author":"Hamilton","year":"2017","journal-title":"IEEE Data Eng. Bull."},{"article-title":"Variational graph auto-encoders","year":"2016","author":"Kipf","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/362"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11604"},{"key":"ref39","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref40","first-page":"1","article-title":"Revisiting graph adversarial attack and defense from a data distribution perspective","volume-title":"Proc. 11th Int. Conf. Learn. Representations","author":"Li"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"ref42","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kipf"},{"issue":"20","key":"ref43","first-page":"10","article-title":"Graph attention networks","volume":"1050","author":"Velickovic","year":"2017","journal-title":"Stat"},{"key":"ref44","first-page":"21","article-title":"Mixhop: Higher-order graph convolutional architectures via sparsified neighborhood mixing","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Abu-El-Haija"},{"key":"ref45","first-page":"1","article-title":"Adaptive universal generalized pagerank graph neural network","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Chien"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/270"},{"key":"ref47","first-page":"21076","article-title":"Rethinking graph neural networks for anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tang"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512195"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i10.29067"},{"key":"ref50","first-page":"1","article-title":"Partitioning message passing for graph fraud detection","volume-title":"Proc. 12th Int. Conf. Learn. Representations","author":"Zhuo"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/310"},{"issue":"11","key":"ref54","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/681"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-024-40474-y"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3162339"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.52202\/079017-4324"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467142"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00036"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599836"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645682"},{"key":"ref64","first-page":"7809","article-title":"Llaga: Large language and graph assistant","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref65","first-page":"5711","article-title":"Harnessing explanations: LLM-to-LM interpreter for enhanced text-attributed graph representation learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"He"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29875"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657775"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833806"},{"key":"ref69","first-page":"2209","article-title":"$\\lbrace${OblivGNN$\\rbrace$}: Oblivious inference on transductive and inductive graph neural network","volume-title":"Proc. 33 rd USENIX Secur. Symp.","author":"Xu"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2024.3369017"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-024-1510-8"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371788"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3015098"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570369"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/675"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2023.08.007"},{"key":"ref77","first-page":"1","article-title":"Latent adversarial training of graph convolution networks","volume-title":"Proc. ICML Workshop Learn. Reasoning Graph-Structured Representations","author":"Jin"},{"key":"ref78","first-page":"8902","article-title":"Improving robustness of GNN-based anomaly detection by graph adversarial training","volume-title":"Proc. 2024 Joint Int. Conf. Comput. Linguistics, Lang. Resour. Eval.","author":"Zheng"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20357"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/11329113\/11278752.pdf?arnumber=11278752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:50:38Z","timestamp":1767678638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11278752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":79,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2025.3640634","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"type":"print","value":"1041-4347"},{"type":"electronic","value":"1558-2191"},{"type":"electronic","value":"2326-3865"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}