{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:04:14Z","timestamp":1768093454780,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19A2068"],"award-info":[{"award-number":["U19A2068"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032002"],"award-info":[{"award-number":["62032002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002248"],"award-info":[{"award-number":["62002248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972448"],"award-info":[{"award-number":["61972448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Science and Technology Program","doi-asserted-by":"publisher","award":["2022YFG0193"],"award-info":[{"award-number":["2022YFG0193"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tnnls.2022.3172296","type":"journal-article","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T19:27:52Z","timestamp":1652470072000},"page":"88-102","source":"Crossref","is-referenced-by-count":11,"title":["AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8412-6414","authenticated-orcid":false,"given":"Ao","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0485-1975","authenticated-orcid":false,"given":"Beibei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5302-3180","authenticated-orcid":false,"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8629-4622","authenticated-orcid":false,"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8495-3631","authenticated-orcid":false,"given":"Rui","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Intelligent Systems, Delft University of Technology, Delft, XE, The Netherlands"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abd4563"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0104-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaw4399"},{"key":"ref4","article-title":"Fake news detection on social media using geometric deep learning","author":"Monti","year":"2019","journal-title":"arXiv:1902.06673"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00378"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134083"},{"key":"ref7","first-page":"1","article-title":"Towards more practical adversarial attacks on graph neural networks","volume-title":"Proc. 34th Adv. Neural Inf. Proces. Syst.","author":"Ma"},{"key":"ref8","first-page":"1","article-title":"Are adversarial examples inevitable?","volume-title":"Proc. 7th Int. Conf. Learn. Represent.","author":"Ali"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2984972"},{"key":"ref10","first-page":"1","article-title":"Improving adversarial robustness requires revisiting misclassified examples","volume-title":"Proc. 8th Int. Conf. Learn. Represent.","author":"Yisen"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313445"},{"key":"ref12","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref13","first-page":"13272","article-title":"Reliable graph neural networks via robust aggregation","volume-title":"Proc. 34th Adv. Neural Inf. Process. Syst.","author":"Geisler"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i18.18017"},{"key":"ref15","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref17","first-page":"1","article-title":"PairNorm: Tackling oversmoothing in GNNs","volume-title":"Proc. 8th Int. Conf. Learn. Represent.","author":"Lingxiao"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00070"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027736"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00096"},{"key":"ref21","first-page":"3844","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Defferrard"},{"key":"ref22","first-page":"695","article-title":"Adversarial attacks on node embeddings via graph poisoning","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bojchevski"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref25","first-page":"1523","article-title":"Graph backdoor","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Xi"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16976"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330905"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"ref29","article-title":"Batch virtual adversarial training for graph convolutional networks","author":"Deng","year":"2019","journal-title":"arXiv:1902.09192"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2957786"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371851"},{"key":"ref32","first-page":"6600","article-title":"Information obfuscation of graph neural networks","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Peiyuan"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2849727"},{"key":"ref35","first-page":"4558","article-title":"Adaptive sampling towards fast graph representation learning","volume-title":"Proc. 32nd Adv. Neural Inf. Proces. Syst.","volume":"31","author":"Huang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref37","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Veli\u010dkovi\u0107"},{"key":"ref38","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Kipf"},{"key":"ref39","article-title":"Understanding and resolving performance degradation in graph convolutional networks","author":"Zhou","year":"2020","journal-title":"arXiv:2006.07107"},{"key":"ref40","first-page":"1","article-title":"What graph neural networks cannot learn: Depth vs width","volume-title":"Proc. 7th Int. Conf. Learn. Represent.","author":"Loukas"},{"key":"ref41","first-page":"695","article-title":"Adversarial attacks on node embeddings via graph poisoning","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bojchevski"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2235192"},{"issue":"79","key":"ref43","first-page":"1","article-title":"Analytical solution of linear ordinary differential equations by differential transfer matrix method","volume":"2003","author":"Khorasani","year":"2003","journal-title":"Electron. J. Differ. Equ."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.879313"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2956374"},{"key":"ref46","first-page":"1","article-title":"Spectral networks and locally connected networks on graphs","volume-title":"Proc. 2nd Int. Conf. Learn. Represent.","author":"Bruna"},{"key":"ref47","first-page":"1","article-title":"Certifiable robustness to graph perturbations","volume-title":"Proc. 33rd Adv. Neural Inf. Proces. Syst.","volume":"32","author":"Bojchevski"},{"key":"ref48","first-page":"1","article-title":"Non-target-specific node injection attacks on graph neural networks: A hierarchical reinforcement learning approach","volume-title":"Proc. 29th Int. Conf. World Wide Web.","volume":"3","author":"Sun"},{"key":"ref49","first-page":"695","article-title":"Adversarial attacks on node embeddings via graph poisoning","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bojchevski"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.165"},{"key":"ref51","first-page":"1","article-title":"Adversarial attacks on graph neural networks via meta learning","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Z\u00fcgner"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102262"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/10381493\/09775013.pdf?arnumber=9775013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:19:06Z","timestamp":1705018746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9775013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":52,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2022.3172296","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}