{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:58:46Z","timestamp":1767999526607,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380029","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:16:51Z","timestamp":1588580211000},"page":"2718-2724","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing"],"prefix":"10.1145","author":[{"given":"Jinyuan","family":"Jia","sequence":"first","affiliation":[{"name":"Duke University, USA"}]},{"given":"Binghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Duke University, USA"}]},{"given":"Xiaoyu","family":"Cao","sequence":"additional","affiliation":[{"name":"Duke University, USA"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Machine Learning. 274\u2013283","author":"Athalye Anish","year":"2018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_3_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML.  Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML."},{"key":"e_1_3_2_1_4_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Certifiable Robustness to Graph Perturbations. In Advances in Neural Information Processing Systems. 8317\u20138328.  Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Certifiable Robustness to Graph Perturbations. In Advances in Neural Information Processing Systems. 8317\u20138328."},{"key":"e_1_3_2_1_5_1","volume-title":"Interval estimation for a binomial proportion. Statistical science","author":"Brown D","year":"2001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134606"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2912801"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134083"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Chih-Hong Cheng Georg N\u00fchrenberg and Harald Ruess. 2017. Maximum resilience of artificial neural networks. In ATVA.  Chih-Hong Cheng Georg N\u00fchrenberg and Harald Ruess. 2017. Maximum resilience of artificial neural networks. In ATVA.","DOI":"10.1007\/978-3-319-68167-2_18"},{"key":"e_1_3_2_1_11_1","unstructured":"Jeremy\u00a0M Cohen Elan Rosenfeld and J\u00a0Zico Kolter. 2019. Certified adversarial robustness via randomized smoothing. In ICML.  Jeremy\u00a0M Cohen Elan Rosenfeld and J\u00a0Zico Kolter. 2019. Certified adversarial robustness via randomized smoothing. In ICML."},{"key":"e_1_3_2_1_12_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. In ICML.  Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. In ICML."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2776133"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0605965104"},{"key":"e_1_3_2_1_15_1","volume-title":"Ai2: Safety and robustness certification of neural networks with abstract interpretation","author":"Gehr Timon"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Learning Representations.","author":"Goodfellow J","year":"2015"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Learning Representations.","author":"Jia Jinyuan","year":"2020"},{"key":"e_1_3_2_1_19_1","volume-title":"Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing. arXiv","author":"Jia Jinyuan","year":"2020"},{"key":"e_1_3_2_1_20_1","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR.  Thomas\u00a0N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_1_21_1","volume-title":"Certified robustness to adversarial examples with differential privacy","author":"Lecuyer Mathias"},{"key":"e_1_3_2_1_22_1","unstructured":"Guang-He Lee Yang Yuan Shiyu Chang and Tommi Jaakkola. 2019. Tight certificates of adversarial robustness for randomly smoothed classifiers. In Advances in Neural Information Processing Systems. 4911\u20134922.  Guang-He Lee Yang Yuan Shiyu Chang and Tommi Jaakkola. 2019. Tight certificates of adversarial robustness for randomly smoothed classifiers. In Advances in Neural Information Processing Systems. 4911\u20134922."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367591"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772755"},{"key":"e_1_3_2_1_26_1","volume-title":"Second-order adversarial attack and certifiable robustness. NeurIPS","author":"Li Bai","year":"2019"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_23"},{"key":"e_1_3_2_1_28_1","volume-title":"International Conference on Learning Representations.","author":"Madry Aleksander","year":"2018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_15"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Jerzy Neyman and Egon\u00a0Sharpe Pearson. 1933. IX. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London. Series A Containing Papers of a Mathematical or Physical Character 231 694-706(1933) 289\u2013337.  Jerzy Neyman and Egon\u00a0Sharpe Pearson. 1933. IX. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London. Series A Containing Papers of a Mathematical or Physical Character 231 694-706(1933) 289\u2013337.","DOI":"10.1098\/rsta.1933.0009"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_33_1","unstructured":"Aditi Raghunathan Jacob Steinhardt and Percy Liang. 2018. Certified defenses against adversarial examples. In ICLR.  Aditi Raghunathan Jacob Steinhardt and Percy Liang. 2018. Certified defenses against adversarial examples. In ICLR."},{"key":"e_1_3_2_1_34_1","unstructured":"Karsten Scheibler Leonore Winterer Ralf Wimmer and Bernd Becker. 2015. Towards Verification of Artificial Neural Networks.. In MBMV.  Karsten Scheibler Leonore Winterer Ralf Wimmer and Bernd Becker. 2015. Towards Verification of Artificial Neural Networks.. In MBMV."},{"key":"e_1_3_2_1_35_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. In ICLR.  Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. In ICLR."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang and Neil\u00a0Zhenqiang Gong. 2019. Attacking Graph-based Classification via Manipulating the Graph Structure. In CCS.  Binghui Wang and Neil\u00a0Zhenqiang Gong. 2019. Attacking Graph-based Classification via Manipulating the Graph Structure. In CCS.","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_1_38_1","unstructured":"Tsui-Wei Weng Huan Zhang Hongge Chen Zhao Song Cho-Jui Hsieh Duane Boning Inderjit\u00a0S Dhillon and Luca Daniel. 2018. Towards fast computation of certified robustness for relu networks. In ICML.  Tsui-Wei Weng Huan Zhang Hongge Chen Zhao Song Cho-Jui Hsieh Duane Boning Inderjit\u00a0S Dhillon and Luca Daniel. 2018. Towards fast computation of certified robustness for relu networks. In ICML."},{"key":"e_1_3_2_1_39_1","unstructured":"Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense. In IJCAI.  Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense. In IJCAI."},{"key":"e_1_3_2_1_40_1","unstructured":"Kaidi Xu Hongge Chen Sijia Liu Pin-Yu Chen Tsui-Wei Weng Mingyi Hong and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. In IJCAI.  Kaidi Xu Hongge Chen Sijia Liu Pin-Yu Chen Tsui-Wei Weng Mingyi Hong and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. In IJCAI."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0693-z"},{"key":"e_1_3_2_1_42_1","unstructured":"Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD.  Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.  Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"e_1_3_2_1_44_1","volume-title":"Adversarial attacks on graph neural networks via meta learning. ICLR","author":"Z\u00fcgner Daniel","year":"2019"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD.  Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD.","DOI":"10.1145\/3292500.3330905"}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:16Z","timestamp":1750199596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":45,"alternative-id":["10.1145\/3366423.3380029","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380029","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}