{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T20:14:41Z","timestamp":1760472881073,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1828363,CNS-1564128,CNS-1824440,CNS-2016589,CNS-1856380,CNS-2016415"],"award-info":[{"award-number":["CNS-1828363,CNS-1564128,CNS-1824440,CNS-2016589,CNS-1856380,CNS-2016415"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427245","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"951-962","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Attacking Graph-Based Classification without Changing Existing Connections"],"prefix":"10.1145","author":[{"given":"Xuening","family":"Xu","sequence":"first","affiliation":[{"name":"Temple University, United States of America"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Temple University"}]},{"given":"Qiang","family":"Zeng","sequence":"additional","affiliation":[{"name":"University of South Carolina"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sok: The evolution of sybil defense via social networks. In 2013 ieee symposium on security and privacy","author":"Alvisi Lorenzo","year":"2013","unstructured":"Lorenzo Alvisi , Allen Clement , Alessandro Epasto , Silvio Lattanzi , and Alessandro Panconesi . 2013 . Sok: The evolution of sybil defense via social networks. In 2013 ieee symposium on security and privacy . IEEE , 382\u2013396. Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, and Alessandro Panconesi. 2013. Sok: The evolution of sybil defense via social networks. In 2013 ieee symposium on security and privacy. IEEE, 382\u2013396."},{"key":"e_1_3_2_1_2_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2018. Adversarial attacks on node embeddings via graph poisoning. arXiv preprint arXiv:1809.01093(2018).  Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2018. Adversarial attacks on node embeddings via graph poisoning. arXiv preprint arXiv:1809.01093(2018)."},{"key":"e_1_3_2_1_3_1","volume-title":"Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS, Vol.\u00a015. 8\u201311.","author":"Boshmaf Yazan","year":"2015","unstructured":"Yazan Boshmaf , Dionysios Logothetis , Georgos Siganos , Jorge Ler\u00eda , Jose Lorenzo , Matei Ripeanu , and Konstantin Beznosov . 2015 . Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS, Vol.\u00a015. 8\u201311. Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Ler\u00eda, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov. 2015. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.. In NDSS, Vol.\u00a015. 8\u201311."},{"key":"e_1_3_2_1_4_1","unstructured":"Joan Bruna Wojciech Zaremba Arthur Szlam and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203(2013).  Joan Bruna Wojciech Zaremba Arthur Szlam and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203(2013)."},{"volume-title":"Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 197\u2013210.","author":"Cao Qiang","key":"e_1_3_2_1_5_1","unstructured":"Qiang Cao , Michael Sirivianos , Xiaowei Yang , and Tiago Pregueiro . 2012. Aiding the detection of fake accounts in large scale social online services . In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 197\u2013210. Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 197\u2013210."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806512"},{"key":"e_1_3_2_1_7_1","volume-title":"Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos.","author":"Horng\u00a0 Duen","year":"2011","unstructured":"Duen Horng\u00a0 \u201c Polo \u201d Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. 2011 . Polonium : Tera-scale graph mining and inference for malware detection. In Proceedings of the 2011 SIAM International Conference on Data Mining. SIAM , 131\u2013142. Duen Horng\u00a0\u201cPolo\u201d Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. 2011. Polonium: Tera-scale graph mining and inference for malware detection. In Proceedings of the 2011 SIAM International Conference on Data Mining. SIAM, 131\u2013142."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134083"},{"key":"e_1_3_2_1_9_1","volume-title":"Thirty-Second AAAI Conference on Artificial Intelligence.","author":"Dai Quanyu","year":"2018","unstructured":"Quanyu Dai , Qiang Li , Jian Tang , and Dan Wang . 2018 . Adversarial network embedding . In Thirty-Second AAAI Conference on Artificial Intelligence. Quanyu Dai, Qiang Li, Jian Tang, and Dan Wang. 2018. Adversarial network embedding. In Thirty-Second AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433147"},{"key":"e_1_3_2_1_11_1","unstructured":"Neil\u00a0Zhenqiang Gong. 2019. Code & Data. http:\/\/gonglab.pratt.duke.edu\/code-data.  Neil\u00a0Zhenqiang Gong. 2019. Code & Data. http:\/\/gonglab.pratt.duke.edu\/code-data."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"e_1_3_2_1_16_1","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907(2016).  Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907(2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_18_1","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data.  Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.47"},{"key":"e_1_3_2_1_20_1","volume-title":"2013 IEEE Symposium on Security and Privacy. IEEE, 112\u2013126","author":"Li Zhou","year":"2013","unstructured":"Zhou Li , Sumayah Alrwais , Yinglian Xie , Fang Yu , and XiaoFeng Wang . 2013 . Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures . In 2013 IEEE Symposium on Security and Privacy. IEEE, 112\u2013126 . Zhou Li, Sumayah Alrwais, Yinglian Xie, Fang Yu, and XiaoFeng Wang. 2013. Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In 2013 IEEE Symposium on Security and Privacy. IEEE, 112\u2013126."},{"key":"e_1_3_2_1_21_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013).  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934998"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/447"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134604"},{"key":"e_1_3_2_1_29_1","unstructured":"Mingjie Sun Jian Tang Huichen Li Bo Li Chaowei Xiao Yao Chen and Dawn Song. 2018. Data poisoning attack against unsupervised node embedding methods. arXiv preprint arXiv:1810.12881(2018).  Mingjie Sun Jian Tang Huichen Li Bo Li Chaowei Xiao Yao Chen and Dawn Song. 2018. Data poisoning attack against unsupervised node embedding methods. arXiv preprint arXiv:1810.12881(2018)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. WWW, Vol.\u00a03.","author":"Sun Yiwei","year":"2020","unstructured":"Yiwei Sun , Suhang Wang , Xianfeng Tang , Tsung-Yu Hsieh , and Vasant Honavar . 2020 . Non-target-specific Node Injection Attacks on Graph Neural Networks: A Hierarchical Reinforcement Learning Approach . In Proc. WWW, Vol.\u00a03. Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, and Vasant Honavar. 2020. Non-target-specific Node Injection Attacks on Graph Neural Networks: A Hierarchical Reinforcement Learning Approach. In Proc. WWW, Vol.\u00a03."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on Machine Learning. 642\u2013650","author":"Torkamani MohamadAli","year":"2013","unstructured":"MohamadAli Torkamani and Daniel Lowd . 2013 . Convex adversarial collective classification . In International Conference on Machine Learning. 642\u2013650 . MohamadAli Torkamani and Daniel Lowd. 2013. Convex adversarial collective classification. In International Conference on Machine Learning. 642\u2013650."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.56"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Binghui Wang Jinyuan Jia and Neil\u00a0Zhenqiang Gong. 2018. Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. arXiv preprint arXiv:1812.01661(2018).  Binghui Wang Jinyuan Jia and Neil\u00a0Zhenqiang Gong. 2018. Graph-based security and privacy analytics via collective classification with joint weight learning and propagation. arXiv preprint arXiv:1812.01661(2018).","DOI":"10.14722\/ndss.2019.23226"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2813672"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057066"},{"key":"e_1_3_2_1_39_1","unstructured":"Xiaoyun Wang Joe Eaton Cho-Jui Hsieh and Felix Wu. 2018. Attack graph convolutional networks by adding fake nodes. arXiv preprint arXiv:1810.10751(2018).  Xiaoyun Wang Joe Eaton Cho-Jui Hsieh and Felix Wu. 2018. Attack graph convolutional networks by adding fake nodes. arXiv preprint arXiv:1810.10751(2018)."},{"key":"e_1_3_2_1_40_1","unstructured":"Keyulu Xu Weihua Hu Jure Leskovec and Stefanie Jegelka. 2018. How powerful are graph neural networks?arXiv preprint arXiv:1810.00826(2018).  Keyulu Xu Weihua Hu Jure Leskovec and Stefanie Jegelka. 2018. How powerful are graph neural networks?arXiv preprint arXiv:1810.00826(2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_42_1","volume-title":"Twenty-Fourth International Joint Conference on Artificial Intelligence.","author":"Yang Cheng","year":"2015","unstructured":"Cheng Yang , Zhiyuan Liu , Deli Zhao , Maosong Sun , and Edward Chang . 2015 . Network representation learning with rich text information . In Twenty-Fourth International Joint Conference on Artificial Intelligence. Cheng Yang, Zhiyuan Liu, Deli Zhao, Maosong Sun, and Edward Chang. 2015. Network representation learning with rich text information. In Twenty-Fourth International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00019"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412(2019).  Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412(2019).","DOI":"10.24963\/ijcai.2019\/872"},{"key":"e_1_3_2_1_46_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}","author":"Zuo Fei","year":"2019","unstructured":"Fei Zuo , Bokai Yang , Xiaopeng Li , and Qiang Zeng . 2019 . Exploiting the inherent limitation of l0 adversarial examples . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 293\u2013307. Fei Zuo, Bokai Yang, Xiaopeng Li, and Qiang Zeng. 2019. Exploiting the inherent limitation of l0 adversarial examples. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 293\u2013307."},{"key":"e_1_3_2_1_47_1","unstructured":"Fei Zuo and Qiang Zeng. 2020. Erase and Restore: Simple Accurate and Resilient Detection of Math 41 Adversarial Examples. arXiv preprint arXiv:2001.00116(2020).  Fei Zuo and Qiang Zeng. 2020. Erase and Restore: Simple Accurate and Resilient Detection of Math 41 Adversarial Examples. arXiv preprint arXiv:2001.00116(2020)."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427245","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":47,"alternative-id":["10.1145\/3427228.3427245","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427245","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}