{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:02:53Z","timestamp":1775880173424,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T00:00:00Z","timestamp":1579478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CDS&E Grant no. OAC-1808591"],"award-info":[{"award-number":["CDS&E Grant no. OAC-1808591"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,20]]},"DOI":"10.1145\/3336191.3371789","type":"proceedings-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:08:16Z","timestamp":1579720096000},"page":"169-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":208,"title":["All You Need Is Low (Rank)"],"prefix":"10.1145","author":[{"given":"Negin","family":"Entezari","sequence":"first","affiliation":[{"name":"University of California Riverside, Riverside, CA, USA"}]},{"given":"Saba A.","family":"Al-Sayouri","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton, NY, USA"}]},{"given":"Amirali","family":"Darvishzadeh","sequence":"additional","affiliation":[{"name":"University of California Riverside, Riverside, CA, USA"}]},{"given":"Evangelos E.","family":"Papalexakis","sequence":"additional","affiliation":[{"name":"University of California Riverside, Riverside, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Saba A Al-Sayouri Ekta Gujral Danai Koutra Evangelos E Papalexakis and Sarah S Lam. 2018. t-PINE: Tensor-based Predictable and Interpretable Node Embeddings. arXiv preprint arXiv:1805.01889 (2018).  Saba A Al-Sayouri Ekta Gujral Danai Koutra Evangelos E Papalexakis and Sarah S Lam. 2018. t-PINE: Tensor-based Predictable and Interpretable Node Embeddings. arXiv preprint arXiv:1805.01889 (2018).","DOI":"10.1109\/ASONAM.2018.8508579"},{"key":"e_1_3_2_1_3_1","unstructured":"Alessandro Bessi. 2015. Two samples test for discrete power-law distributions. arXiv preprint arXiv:1503.00643 (2015).  Alessandro Bessi. 2015. Two samples test for discrete power-law distributions. arXiv preprint arXiv:1503.00643 (2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Smriti Bhagat Graham Cormode and S Muthukrishnan. 2011. Node classification in social networks. Social network data analytics . Springer 115--148.  Smriti Bhagat Graham Cormode and S Muthukrishnan. 2011. Node classification in social networks. Social network data analytics . Springer 115--148.","DOI":"10.1007\/978-1-4419-8462-3_5"},{"key":"e_1_3_2_1_5_1","unstructured":"Arjun Nitin Bhagoji Daniel Cullina and Prateek Mittal. 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint (2017).  Arjun Nitin Bhagoji Daniel Cullina and Prateek Mittal. 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 (2012).  Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 (2012)."},{"key":"e_1_3_2_1_7_1","unstructured":"Aleksandar Bojcheski and Stephan G\u00fcnnemann. 2018. Adversarial attacks on node embeddings. arXiv preprint arXiv:1809.01093 (2018).  Aleksandar Bojcheski and Stephan G\u00fcnnemann. 2018. Adversarial attacks on node embeddings. arXiv preprint arXiv:1809.01093 (2018)."},{"key":"e_1_3_2_1_8_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2018. Deep Gaussian Embedding of Graphs: Unsupervised Inductive Learning via Ranking. (2018).  Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2018. Deep Gaussian Embedding of Graphs: Unsupervised Inductive Learning via Ranking. (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310791"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Aaron Clauset Cosma Rohilla Shalizi and Mark EJ Newman. 2009. Power-law distributions in empirical data. SIAM review Vol. 51 4 (2009) 661--703.  Aaron Clauset Cosma Rohilla Shalizi and Mark EJ Newman. 2009. Power-law distributions in empirical data. SIAM review Vol. 51 4 (2009) 661--703.","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_11_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial Attack on Graph Structured Data. arXiv preprint arXiv:1806.02371 (2018).  Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial Attack on Graph Structured Data. arXiv preprint arXiv:1806.02371 (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_13_1","volume-title":"Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression. arXiv preprint arXiv:1802.06816","author":"Das Nilaksh","year":"2018"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288367"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/276675.276685"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_17_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in Neural Information Processing Systems. 1024--1034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in Neural Information Processing Systems. 1024--1034."},{"key":"e_1_3_2_1_18_1","unstructured":"R.A. Harshman. 1970. Foundations of the PARAFAC procedure: Models and conditions for an\" explanatory\" multimodal factor analysis. (1970).  R.A. Harshman. 1970. Foundations of the PARAFAC procedure: Models and conditions for an\" explanatory\" multimodal factor analysis. (1970)."},{"key":"e_1_3_2_1_19_1","volume-title":"5th International Conference on Learning Representations (ICLR-17)","author":"Kipf Thomas N","year":"2017"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"T.G. Kolda and B.W. Bader. 2009. Tensor decompositions and applications. SIAM review Vol. 51 3 (2009).  T.G. Kolda and B.W. Bader. 2009. Tensor decompositions and applications. SIAM review Vol. 51 3 (2009).","DOI":"10.1137\/07070111X"},{"key":"e_1_3_2_1_21_1","unstructured":"Alexey Kurakin Ian Goodfellow and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016).  Alexey Kurakin Ian Goodfellow and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 31st International Conference on Machine Learning (ICML-14)","author":"Le Quoc","year":"2014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009953814988"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Shike Mei and Xiaojin Zhu. 2015. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners.. In AAAI. 2871--2877.  Shike Mei and Xiaojin Zhu. 2015. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners.. In AAAI. 2871--2877.","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"e_1_3_2_1_25_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013a. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013).  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013a. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_26_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013b. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013b. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_28_1","first-page":"16","article-title":"Tensors for data mining and data fusion: Models, applications, and scalable algorithms","volume":"8","author":"Papalexakis Evangelos E","year":"2017","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_31_1","volume-title":"Walklets: Multiscale graph embeddings for interpretable network classification. arXiv preprint arXiv:1605.02115","author":"Perozzi Bryan","year":"2016"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Trang Pham Truyen Tran Dinh Q Phung and Svetha Venkatesh. 2017. Column Networks for Collective Classification.. In AAAI. 2485--2491.  Trang Pham Truyen Tran Dinh Q Phung and Svetha Venkatesh. 2017. Column Networks for Collective Classification.. In AAAI. 2485--2491.","DOI":"10.1609\/aaai.v31i1.10851"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.36"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Neil Shah Alex Beutel Brian Gallagher and Christos Faloutsos. 2014b. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. arXiv preprint arXiv:1410.3915 (2014).  Neil Shah Alex Beutel Brian Gallagher and Christos Faloutsos. 2014b. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. arXiv preprint arXiv:1410.3915 (2014).","DOI":"10.1109\/ICDM.2014.36"},{"key":"e_1_3_2_1_35_1","unstructured":"Mingjie Sun Jian Tang Huichen Li Bo Li Chaowei Xiao Yao Chen and Dawn Song. 2018. Data Poisoning Attack against Unsupervised Node Embedding Methods. arXiv preprint arXiv:1810.12881 (2018).  Mingjie Sun Jian Tang Huichen Li Bo Li Chaowei Xiao Yao Chen and Dawn Song. 2018. Data Poisoning Attack against Unsupervised Node Embedding Methods. arXiv preprint arXiv:1810.12881 (2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).  Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_37_1","unstructured":"Cheng Yang Zhiyuan Liu Deli Zhao Maosong Sun and Edward Y Chang. 2015. Network Representation Learning with Rich Text Information.. In IJCAI . 2111--2117.  Cheng Yang Zhiyuan Liu Deli Zhao Maosong Sun and Edward Y Chang. 2015. Network Representation Learning with Rich Text Information.. In IJCAI . 2111--2117."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"}],"event":{"name":"WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining","location":"Houston TX USA","acronym":"WSDM '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 13th International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371789","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:10Z","timestamp":1750206370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371789"}},"subtitle":["Defending Against Adversarial Attacks on Graphs"],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":38,"alternative-id":["10.1145\/3336191.3371789","10.1145\/3336191"],"URL":"https:\/\/doi.org\/10.1145\/3336191.3371789","relation":{},"subject":[],"published":{"date-parts":[[2020,1,20]]},"assertion":[{"value":"2020-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}