{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:28:55Z","timestamp":1777127335848,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T00:00:00Z","timestamp":1579478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1909702"],"award-info":[{"award-number":["1909702"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,20]]},"DOI":"10.1145\/3336191.3371851","type":"proceedings-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:08:16Z","timestamp":1579720096000},"page":"600-608","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":116,"title":["Transferring Robustness for Graph Neural Network Against Poisoning Attacks"],"prefix":"10.1145","author":[{"given":"Xianfeng","family":"Tang","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Yandong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Yiwei","family":"Sun","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Huaxiu","family":"Yao","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Prasenjit","family":"Mitra","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Suhang","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Graph based anomaly detection and description: a survey. Data mining and knowledge discovery","author":"Akoglu Leman","year":"2015","unstructured":"Leman Akoglu , Hanghang Tong , and Danai Koutra . 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery , Vol. 29 , 3 ( 2015 ), 626--688. Leman Akoglu, Hanghang Tong, and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery, Vol. 29, 3 (2015), 626--688."},{"key":"e_1_3_2_1_2_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML.  Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML."},{"key":"e_1_3_2_1_3_1","volume-title":"Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203","author":"Bruna Joan","year":"2013","unstructured":"Joan Bruna , Wojciech Zaremba , Arthur Szlam , and Yann LeCun . 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203 ( 2013 ). Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203 (2013)."},{"key":"e_1_3_2_1_4_1","volume-title":"Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797","author":"Chen Jinyin","year":"2018","unstructured":"Jinyin Chen , Yangyang Wu , Xuanheng Xu , Yixian Chen , Haibin Zheng , and Qi Xuan . 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 ( 2018 ). Jinyin Chen, Yangyang Wu, Xuanheng Xu, Yixian Chen, Haibin Zheng, and Qi Xuan. 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018)."},{"key":"e_1_3_2_1_5_1","volume-title":"Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457","author":"Cheng Minhao","year":"2018","unstructured":"Minhao Cheng , Thong Le , Pin-Yu Chen , Jinfeng Yi , Huan Zhang , and Cho-Jui Hsieh . 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 ( 2018 ). Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, and Cho-Jui Hsieh. 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 (2018)."},{"key":"e_1_3_2_1_6_1","volume-title":"Adversarial attack on graph structured data. ICML","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai , Hui Li , Tian Tian , Xin Huang , Lin Wang , Jun Zhu , and Le Song . 2018. Adversarial attack on graph structured data. ICML ( 2018 ). Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. ICML (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In Advances in neural information processing systems. 3844--3852.  Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In Advances in neural information processing systems. 3844--3852."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019 a. Deep Anomaly Detection on Attributed Networks. In SDM.  Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019 a. Deep Anomaly Detection on Attributed Networks. In SDM.","DOI":"10.1145\/3289600.3290964"},{"key":"e_1_3_2_1_9_1","volume-title":"2019 b. Graph Neural Networks with High-order Feature Interactions. arXiv preprint arXiv:1908.07110","author":"Ding Kaize","year":"2019","unstructured":"Kaize Ding , Yichuan Li , Jundong Li , Chenghao Liu , and Huan Liu . 2019 b. Graph Neural Networks with High-order Feature Interactions. arXiv preprint arXiv:1908.07110 ( 2019 ). Kaize Ding, Yichuan Li, Jundong Li, Chenghao Liu, and Huan Liu. 2019 b. Graph Neural Networks with High-order Feature Interactions. arXiv preprint arXiv:1908.07110 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Graph Neural Networks for Social Recommendation. In The World Wide Web Conference. ACM, 417--426","author":"Fan Wenqi","year":"2019","unstructured":"Wenqi Fan , Yao Ma , Qing Li , Yuan He , Eric Zhao , Jiliang Tang , and Dawei Yin . 2019 . Graph Neural Networks for Social Recommendation. In The World Wide Web Conference. ACM, 417--426 . Wenqi Fan, Yao Ma, Qing Li, Yuan He, Eric Zhao, Jiliang Tang, and Dawei Yin. 2019. Graph Neural Networks for Social Recommendation. In The World Wide Web Conference. ACM, 417--426."},{"key":"e_1_3_2_1_11_1","unstructured":"Chelsea Finn Pieter Abbeel and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In ICML.  Chelsea Finn Pieter Abbeel and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In ICML."},{"key":"e_1_3_2_1_12_1","unstructured":"Hongyang Gao Zhengyang Wang and Shuiwang Ji. 2018. Large-scale learnable graph convolutional networks. In KDD.  Hongyang Gao Zhengyang Wang and Shuiwang Ji. 2018. Large-scale learnable graph convolutional networks. In KDD."},{"key":"e_1_3_2_1_13_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_14_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS."},{"key":"e_1_3_2_1_15_1","volume-title":"Deep convolutional networks on graph-structured data. arXiv preprint arXiv:1506.05163","author":"Henaff Mikael","year":"2015","unstructured":"Mikael Henaff , Joan Bruna , and Yann LeCun . 2015. Deep convolutional networks on graph-structured data. arXiv preprint arXiv:1506.05163 ( 2015 ). Mikael Henaff, Joan Bruna, and Yann LeCun. 2015. Deep convolutional networks on graph-structured data. arXiv preprint arXiv:1506.05163 (2015)."},{"key":"e_1_3_2_1_16_1","volume-title":"Learning to learn using gradient descent","author":"Hochreiter Sepp","unstructured":"Sepp Hochreiter , A Steven Younger , and Peter R Conwell . 2001. Learning to learn using gradient descent . In ICANN. Springer , 87--94. Sepp Hochreiter, A Steven Younger, and Peter R Conwell. 2001. Learning to learn using gradient descent. In ICANN. Springer, 87--94."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Chao Huang Xian Wu Xuchao Zhang Chuxu Zhang Jiashu Zhao Dawei Yin and Nitesh V Chawla. 2019. Online Purchase Prediction via Multi-Scale Modeling of Behavior Dynamics. In KDD. ACM 2613--2622.  Chao Huang Xian Wu Xuchao Zhang Chuxu Zhang Jiashu Zhao Dawei Yin and Nitesh V Chawla. 2019. Online Purchase Prediction via Multi-Scale Modeling of Behavior Dynamics. In KDD. ACM 2613--2622.","DOI":"10.1145\/3292500.3330790"},{"key":"e_1_3_2_1_18_1","volume-title":"Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering. arXiv preprint arXiv:1905.10029","author":"Jin Ming","year":"2019","unstructured":"Ming Jin , Heng Chang , Wenwu Zhu , and Somayeh Sojoudi . 2019. Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering. arXiv preprint arXiv:1905.10029 ( 2019 ). Ming Jin, Heng Chang, Wenwu Zhu, and Somayeh Sojoudi. 2019. Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering. arXiv preprint arXiv:1905.10029 (2019)."},{"key":"e_1_3_2_1_19_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling . 2016. Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907 ( 2016 ). Thomas N Kipf and Max Welling. 2016. Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_20_1","unstructured":"Jaekoo Lee Hyunjae Kim Jongsun Lee and Sungroh Yoon. 2017. Transfer learning for deep learning on graph-structured data. In AAAI.  Jaekoo Lee Hyunjae Kim Jongsun Lee and Sungroh Yoon. 2017. Transfer learning for deep learning on graph-structured data. In AAAI."},{"key":"e_1_3_2_1_21_1","volume-title":"Click Feedback-Aware Query Recommendation Using Adversarial Examples. In The World Wide Web Conference. ACM, 2978--2984","author":"Li Ruirui","year":"2019","unstructured":"Ruirui Li , Liangda Li , Xian Wu , Yunhong Zhou , and Wei Wang . 2019 c . Click Feedback-Aware Query Recommendation Using Adversarial Examples. In The World Wide Web Conference. ACM, 2978--2984 . Ruirui Li, Liangda Li, Xian Wu, Yunhong Zhou, and Wei Wang. 2019 c. Click Feedback-Aware Query Recommendation Using Adversarial Examples. In The World Wide Web Conference. ACM, 2978--2984."},{"key":"e_1_3_2_1_22_1","unstructured":"Ruoyu Li Sheng Wang Feiyun Zhu and Junzhou Huang. 2018b. Adaptive graph convolutional neural networks. In AAAI.  Ruoyu Li Sheng Wang Feiyun Zhu and Junzhou Huang. 2018b. Adaptive graph convolutional neural networks. In AAAI."},{"key":"e_1_3_2_1_23_1","volume-title":"2019 a. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv preprint arXiv:1904.00979","author":"Li Yingwei","year":"2019","unstructured":"Yingwei Li , Song Bai , Cihang Xie , Zhenyu Liao , Xiaohui Shen , and Alan L Yuille . 2019 a. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv preprint arXiv:1904.00979 ( 2019 ). Yingwei Li, Song Bai, Cihang Xie, Zhenyu Liao, Xiaohui Shen, and Alan L Yuille. 2019 a. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv preprint arXiv:1904.00979 (2019)."},{"key":"e_1_3_2_1_24_1","volume-title":"Learning Transferable Adversarial Examples via Ghost Networks. arXiv preprint arXiv:1812.03413","author":"Li Yingwei","year":"2018","unstructured":"Yingwei Li , Song Bai , Yuyin Zhou , Cihang Xie , Zhishuai Zhang , and Alan Yuille . 2018a. Learning Transferable Adversarial Examples via Ghost Networks. arXiv preprint arXiv:1812.03413 ( 2018 ). Yingwei Li, Song Bai, Yuyin Zhou, Cihang Xie, Zhishuai Zhang, and Alan Yuille. 2018a. Learning Transferable Adversarial Examples via Ghost Networks. arXiv preprint arXiv:1812.03413 (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"2019 b. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks. ICML","author":"Li Yandong","year":"2019","unstructured":"Yandong Li , Lijun Li , Liqiang Wang , Tong Zhang , and Boqing Gong . 2019 b. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks. ICML ( 2019 ). Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, and Boqing Gong. 2019 b. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks. ICML (2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Yao Ma Suhang Wang Charu C. Aggarwal and Jiliang Tang. 2019 a. Graph Convolutional Networks with EigenPooling. In KDD.  Yao Ma Suhang Wang Charu C. Aggarwal and Jiliang Tang. 2019 a. Graph Convolutional Networks with EigenPooling. In KDD.","DOI":"10.1145\/3292500.3330982"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Yao Ma Suhang Wang Charu C. Aggarwal Dawei Yin and Jiliang Tang. 2019 b. Multi-dimensional Graph Convolutional Networks. In SDM.  Yao Ma Suhang Wang Charu C. Aggarwal Dawei Yin and Jiliang Tang. 2019 b. Multi-dimensional Graph Convolutional Networks. In SDM.","DOI":"10.1137\/1.9781611975673.74"},{"key":"e_1_3_2_1_28_1","volume-title":"2019 c. Attacking Graph Convolutional Networks via Rewiring. arXiv preprint:1906.03750","author":"Ma Yao","year":"2019","unstructured":"Yao Ma , Suhang Wang , Lingfei Wu , and Jiliang Tang . 2019 c. Attacking Graph Convolutional Networks via Rewiring. arXiv preprint:1906.03750 ( 2019 ). Yao Ma, Suhang Wang, Lingfei Wu, and Jiliang Tang. 2019 c. Attacking Graph Convolutional Networks via Rewiring. arXiv preprint:1906.03750 (2019)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Federico Monti Davide Boscaini Jonathan Masci Emanuele Rodola Jan Svoboda and Michael M Bronstein. 2017. Geometric deep learning on graphs and manifolds using mixture model cnns. In CVPR.  Federico Monti Davide Boscaini Jonathan Masci Emanuele Rodola Jan Svoboda and Michael M Bronstein. 2017. Geometric deep learning on graphs and manifolds using mixture model cnns. In CVPR.","DOI":"10.1109\/CVPR.2017.576"},{"key":"e_1_3_2_1_30_1","unstructured":"Mathias Niepert Mohamed Ahmed and Konstantin Kutzkov. 2016. Learning convolutional neural networks for graphs. In ICML.  Mathias Niepert Mohamed Ahmed and Konstantin Kutzkov. 2016. Learning convolutional neural networks for graphs. In ICML."},{"key":"e_1_3_2_1_31_1","volume-title":"Glove: Global vectors for word representation. In EMNLP.","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington , Richard Socher , and Christopher Manning . 2014 . Glove: Global vectors for word representation. In EMNLP. Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global vectors for word representation. In EMNLP."},{"key":"e_1_3_2_1_32_1","unstructured":"Adam Santoro Sergey Bartunov Matthew Botvinick Daan Wierstra and Timothy Lillicrap. 2016. Meta-learning with memory-augmented neural networks. In ICML.  Adam Santoro Sergey Bartunov Matthew Botvinick Daan Wierstra and Timothy Lillicrap. 2016. Meta-learning with memory-augmented neural networks. In ICML."},{"key":"e_1_3_2_1_33_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen , Galileo Namata , Mustafa Bilgic , Lise Getoor , Brian Galligher , and Tina Eliassi-Rad . 2008. Collective classification in network data. AI magazine , Vol. 29 , 3 ( 2008 ), 93--93. Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine, Vol. 29, 3 (2008), 93--93."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159692"},{"key":"e_1_3_2_1_35_1","volume-title":"Node Injection Attacks on Graphs via Reinforcement Learning. arXiv preprint arXiv:1909.06543","author":"Sun Yiwei","year":"2019","unstructured":"Yiwei Sun , Suhang Wang , Xianfeng Tang , Tsung-Yu Hsieh , and Vasant Honavar . 2019. Node Injection Attacks on Graphs via Reinforcement Learning. arXiv preprint arXiv:1909.06543 ( 2019 ). Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, and Vasant Honavar. 2019. Node Injection Attacks on Graphs via Reinforcement Learning. arXiv preprint arXiv:1909.06543 (2019)."},{"key":"e_1_3_2_1_36_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_37_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Petar Velivc","year":"2017","unstructured":"Petar Velivc kovi\u0107, Guillem Cucurull , Arantxa Casanova , Adriana Romero , Pietro Lio , and Yoshua Bengio . 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 ( 2017 ). Petar Velivc kovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_38_1","volume-title":"et almbox","author":"Vinyals Oriol","year":"2016","unstructured":"Oriol Vinyals , Charles Blundell , Timothy Lillicrap , Daan Wierstra , et almbox . 2016 . Matching networks for one shot learning. In Advances in neural information processing systems. 3630--3638. Oriol Vinyals, Charles Blundell, Timothy Lillicrap, Daan Wierstra, et almbox. 2016. Matching networks for one shot learning. In Advances in neural information processing systems. 3630--3638."},{"key":"e_1_3_2_1_39_1","volume-title":"Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019 c. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153","author":"Wu Felix","year":"2019","unstructured":"Felix Wu , Tianyi Zhang , Amauri Holanda de Souza Jr , Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019 c. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 ( 2019 ). Felix Wu, Tianyi Zhang, Amauri Holanda de Souza Jr, Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019 c. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 (2019)."},{"key":"e_1_3_2_1_40_1","unstructured":"Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019 b. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense. In IJCAI.  Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019 b. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense. In IJCAI."},{"key":"e_1_3_2_1_41_1","volume-title":"2019 a. A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596","author":"Wu Zonghan","year":"2019","unstructured":"Zonghan Wu , Shirui Pan , Fengwen Chen , Guodong Long , Chengqi Zhang , and Philip S Yu . 2019 a. A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596 ( 2019 ). Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and Philip S Yu. 2019 a. A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596 (2019)."},{"key":"e_1_3_2_1_42_1","volume-title":"2019 b. Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072","author":"Xu Han","year":"2019","unstructured":"Han Xu , Yao Ma , Haochen Liu , Debayan Deb , Hui Liu , Jiliang Tang , and Anil Jain . 2019 b. Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072 ( 2019 ). Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, and Anil Jain. 2019 b. Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072 (2019)."},{"key":"e_1_3_2_1_43_1","volume-title":"2019 a. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. arXiv preprint arXiv:1906.04214","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu , Hongge Chen , Sijia Liu , Pin-Yu Chen , Tsui-Wei Weng , Mingyi Hong , and Xue Lin . 2019 a. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. arXiv preprint arXiv:1906.04214 ( 2019 ). Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019 a. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. arXiv preprint arXiv:1906.04214 (2019)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313577"},{"key":"e_1_3_2_1_45_1","unstructured":"Huaxiu Yao Ying Wei Junzhou Huang and Zhenhui Li. 2019 b. Hierarchically Structured Meta-learning. In ICML. 7045--7054.  Huaxiu Yao Ying Wei Junzhou Huang and Zhenhui Li. 2019 b. Hierarchically Structured Meta-learning. In ICML. 7045--7054."},{"key":"e_1_3_2_1_46_1","volume-title":"2019 c. Graph Few-shot Learning via Knowledge Transfer. arXiv preprint arXiv:1910.03053","author":"Yao Huaxiu","year":"2019","unstructured":"Huaxiu Yao , Chuxu Zhang , Ying Wei , Meng Jiang , Suhang Wang , Junzhou Huang , Nitesh V Chawla , and Zhenhui Li . 2019 c. Graph Few-shot Learning via Knowledge Transfer. arXiv preprint arXiv:1910.03053 ( 2019 ). Huaxiu Yao, Chuxu Zhang, Ying Wei, Meng Jiang, Suhang Wang, Junzhou Huang, Nitesh V Chawla, and Zhenhui Li. 2019 c. Graph Few-shot Learning via Knowledge Transfer. arXiv preprint arXiv:1910.03053 (2019)."},{"key":"e_1_3_2_1_47_1","volume-title":"Gaan: Gated attention networks for learning on large and spatiotemporal graphs. arXiv preprint arXiv:1803.07294","author":"Zhang Jiani","year":"2018","unstructured":"Jiani Zhang , Xingjian Shi , Junyuan Xie , Hao Ma , Irwin King , and Dit-Yan Yeung . 2018 . Gaan: Gated attention networks for learning on large and spatiotemporal graphs. arXiv preprint arXiv:1803.07294 (2018). Jiani Zhang, Xingjian Shi, Junyuan Xie, Hao Ma, Irwin King, and Dit-Yan Yeung. 2018. Gaan: Gated attention networks for learning on large and spatiotemporal graphs. arXiv preprint arXiv:1803.07294 (2018)."},{"key":"e_1_3_2_1_48_1","unstructured":"Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD.  Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.  Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable robustness and robust training for graph convolutional networks. In KDD.  Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable robustness and robust training for graph convolutional networks. In KDD.","DOI":"10.1145\/3292500.3330905"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR.  Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR.","DOI":"10.24963\/ijcai.2019\/872"}],"event":{"name":"WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining","location":"Houston TX USA","acronym":"WSDM '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 13th International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371851","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:14Z","timestamp":1750202594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":51,"alternative-id":["10.1145\/3336191.3371851","10.1145\/3336191"],"URL":"https:\/\/doi.org\/10.1145\/3336191.3371851","relation":{},"subject":[],"published":{"date-parts":[[2020,1,20]]},"assertion":[{"value":"2020-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}