{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:37:43Z","timestamp":1773704263385,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072406"],"award-info":[{"award-number":["62072406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY19F020025"],"award-info":[{"award-number":["LY19F020025"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of the Public Security Ministry Open Project","award":["2020DSJSYS001"],"award-info":[{"award-number":["2020DSJSYS001"]}]},{"name":"Key R&amp;D Projects in Zhejiang Province","award":["2021C01117"],"award-info":[{"award-number":["2021C01117"]}]},{"name":"Industrial Internet Innovation Development Project","award":["TC200H01\u00a0V"],"award-info":[{"award-number":["TC200H01\u00a0V"]}]},{"name":"Ten Thousand Talents Program Science and Technology Innovation Leading Talent Project in Zhejiang Province","award":["2020R52011"],"award-info":[{"award-number":["2020R52011"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018AAA0100801"],"award-info":[{"award-number":["2018AAA0100801"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Knowledge Graph Research and Platform Design for Intelligent Medical Insurance Audit System","award":["LGF20F020016"],"award-info":[{"award-number":["LGF20F020016"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1109\/tnse.2021.3127557","type":"journal-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:26:48Z","timestamp":1636763208000},"page":"577-595","source":"Crossref","is-referenced-by-count":14,"title":["GraphAttacker: A General Multi-Task Graph Attack Framework"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-2755","authenticated-orcid":false,"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security and College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Dunjie","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6766-4579","authenticated-orcid":false,"given":"Zhaoyan","family":"Ming","sequence":"additional","affiliation":[{"name":"Zhejiang University City College, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3722-9979","authenticated-orcid":false,"given":"Kejie","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Wenrong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Big Data and Cyber Security, Zhejiang Police College, Hangzhou, China"}]},{"given":"Chen","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Computer Science, Hangzhou Dianzi University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2856280"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2871726"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(02)01089-0"},{"key":"ref5","article-title":"Inductive representation learning on large graphs","author":"Hamilton","year":"2017"},{"key":"ref6","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kipf","year":"2017"},{"key":"ref7","article-title":"Strategies for pre-training graph neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Hu","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783307"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983755"},{"key":"ref12","article-title":"Hierarchical graph representation learning with differentiable pooling","author":"Ying"},{"key":"ref13","first-page":"3734","article-title":"Self-attention graph pooling","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Lee","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8916"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2606098"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2016.2634322"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006464"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2019.8923033"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8424608"},{"issue":"3","key":"ref22","first-page":"43","article-title":"Mapping networks of terrorist cells","volume":"24","author":"Krebs","year":"2002","journal-title":"Connections"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2712150"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00143"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref26","article-title":"Fast gradient attack on network embedding","author":"Chen","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref28","first-page":"1523","article-title":"Graph backdoor","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Xi","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2912801"},{"key":"ref31","article-title":"Towards more practical adversarial attacks on graph neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ma","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313445"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2957786"},{"key":"ref34","article-title":"Comparing and detecting adversarial attacks for graph deep learning","volume-title":"Proc. Representation Learn. Graphs Manifolds Workshop","author":"Zhang","year":"2019"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3042628"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371851"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006004"},{"key":"ref39","article-title":"GraphSAC: Detecting anomalies in large-scale graphs","author":"Ioannidis","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/872"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref42","article-title":"GNNGuard: Defending graph neural networks against adversarial attacks","author":"Zhang","year":"2020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7993-3_19"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00204"},{"key":"ref47","article-title":"Attack graph convolutional networks by adding fake nodes","author":"Wang","year":"2018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/458"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3078755"},{"key":"ref50","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dai","year":"2018"},{"key":"ref51","article-title":"Adversarial attack on hierarchical graph pooling neural networks","author":"Tang","year":"2020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3004059"},{"key":"ref53","article-title":"Variational graph auto-encoders","author":"Kipf","year":"2016"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3110580"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00019"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31654-9_37"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"ref58","article-title":"Certifiable robustness to graph perturbations","author":"Bojchevski","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014360"},{"key":"ref60","article-title":"How powerful are graph neural networks?","volume-title":"Proc. 7th Int. Conf. Learn. Representations","author":"Xu"},{"issue":"76","key":"ref61","first-page":"62","article-title":"Multi-task learning on graphs with node and graph level labels","volume":"4","author":"Holtz","year":"2019","journal-title":"SAGE"},{"key":"ref62","first-page":"5776","article-title":"Learning to multitask","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3036825"},{"key":"ref64","article-title":"A meta-learning approach for graph representation learning in multi-task settings","author":"Buffelli","year":"2020"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2010.11.027"},{"issue":"2","key":"ref66","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1023\/A:1009953814988","article-title":"Automating the construction of internet portals with machine learning","volume":"3","author":"McCallum","year":"2000","journal-title":"Inf. Retrieval"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10034"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_15"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti1007"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2836(03)00628-4"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkh081"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0103-5"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783417"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036104"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1038\/nature750"},{"key":"ref77","first-page":"548","article-title":"Learning to discover social circles in ego networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"2012","author":"McAuley","year":"2012"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"ref79","first-page":"2672","article-title":"Generative adversarial nets","author":"Goodfellow","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403177"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9740232\/09613779.pdf?arnumber=9613779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:03:57Z","timestamp":1705021437000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9613779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":80,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2021.3127557","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]}}}