{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:35:22Z","timestamp":1758267322336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020AAA0105200"],"award-info":[{"award-number":["2020AAA0105200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"K.C. Wong Education Foundation"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62041207, 91746301"],"award-info":[{"award-number":["62041207, 91746301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Academy of Artificial Intelligence (BAAI)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,8]]},"DOI":"10.1145\/3437963.3441782","type":"proceedings-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T04:34:28Z","timestamp":1615005268000},"page":"698-706","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Adversarial Immunization for Certifiable Robustness on Graphs"],"prefix":"10.1145","author":[{"given":"Shuchang","family":"Tao","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Huawei","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Liang","family":"Hou","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML '19)","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann . 2019 . Adversarial Attacks on Node Embeddings via Graph Poisoning . In Proceedings of the 36th International Conference on Machine Learning (ICML '19) . 695--704. Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In Proceedings of the 36th International Conference on Machine Learning (ICML '19). 695--704."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems. 8319--8330","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann . 2019 . Certifiable Robustness to Graph Perturbations . In Proceedings of the 33rd International Conference on Neural Information Processing Systems. 8319--8330 . Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Certifiable Robustness to Graph Perturbations. In Proceedings of the 33rd International Conference on Neural Information Processing Systems. 8319--8330."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning (ICML '20)","author":"Bojchevski Aleksandar","year":"2020","unstructured":"Aleksandar Bojchevski , Johannes Klicpera , and Stephan G\u00fcnnemann . 2020 . Efficient Robustness Certificates for Discrete Data: Sparsity-Aware Randomized Smoothing for Graphs, Images and More . In Proceedings of the 37th International Conference on Machine Learning (ICML '20) . 11647--11657. Aleksandar Bojchevski, Johannes Klicpera, and Stephan G\u00fcnnemann. 2020. Efficient Robustness Certificates for Discrete Data: Sparsity-Aware Randomized Smoothing for Graphs, Images and More. In Proceedings of the 37th International Conference on Machine Learning (ICML '20). 11647--11657."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371834"},{"volume-title":"Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (SP '17)","author":"Carlini Nicholas","key":"e_1_3_2_1_5_1","unstructured":"Nicholas Carlini and David A. Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (SP '17) . 39--57. Nicholas Carlini and David A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (SP '17). 39--57."},{"key":"e_1_3_2_1_6_1","volume-title":"A Survey of Adversarial Learning on Graphs. ArXiv","author":"Chen Liang","year":"2020","unstructured":"Liang Chen , Jintang Li , Jiaying Peng , Tao Xie , Zengxu Cao , Kun Xu , Xiangnan He , and Zibin Zheng . 2020. A Survey of Adversarial Learning on Graphs. ArXiv , Vol. abs\/ 2003 .05730 ( 2020 ). Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, and Zibin Zheng. 2020. A Survey of Adversarial Learning on Graphs. ArXiv, Vol. abs\/2003.05730 (2020)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML '18)","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai , Hui Li , Tian Tian , Xin Huang , Lin Wang , Jun Zhu , and Le Song . 2018 . Adversarial Attack on Graph Structured Data . In Proceedings of the 35th International Conference on Machine Learning (ICML '18) . 1123--1132. Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial Attack on Graph Structured Data. In Proceedings of the 35th International Conference on Machine Learning (ICML '18). 1123--1132."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313445"},{"volume-title":"Proceedings of the 13th International Conference on Web Search and Data Mining (WSDM '20)","author":"Entezari Negin","key":"e_1_3_2_1_9_1","unstructured":"Negin Entezari , Saba A. Al-Sayouri , Amirali Darvishzadeh , and Evangelos E. Papalexakis . 2020. All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs . In Proceedings of the 13th International Conference on Web Search and Data Mining (WSDM '20) . 169--177. Negin Entezari, Saba A. Al-Sayouri, Amirali Darvishzadeh, and Evangelos E. Papalexakis. 2020. All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs. In Proceedings of the 13th International Conference on Web Search and Data Mining (WSDM '20). 169--177."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_1_11_1","volume-title":"Graph adversarial training: Dynamically regularizing based on graph structure","author":"Feng Fuli","year":"2019","unstructured":"Fuli Feng , Xiangnan He , Jie Tang , and Tat-Seng Chua . 2019. Graph adversarial training: Dynamically regularizing based on graph structure . IEEE Transactions on Knowledge and Data Engineering ( 2019 ). Fuli Feng, Xiangnan He, Jie Tang, and Tat-Seng Chua. 2019. Graph adversarial training: Dynamically regularizing based on graph structure. IEEE Transactions on Knowledge and Data Engineering (2019)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML '17)","author":"Finn Chelsea","year":"2017","unstructured":"Chelsea Finn , Pieter Abbeel , and Sergey Levine . 2017 . Model-agnostic meta-learning for fast adaptation of deep networks . In Proceedings of the 34th International Conference on Machine Learning (ICML '17) . 1126--1135. Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In Proceedings of the 34th International Conference on Machine Learning (ICML '17). 1126--1135."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294869"},{"key":"e_1_3_2_1_15_1","unstructured":"Wenbing Huang Tong Zhang Yu Rong and Junzhou Huang. 2018. Adaptive Sampling Towards Fast Graph Representation Learning. In Advances in Neural Information Processing Systems 31. 4558--4567.  Wenbing Huang Tong Zhang Yu Rong and Junzhou Huang. 2018. Adaptive Sampling Towards Fast Graph Representation Learning. In Advances in Neural Information Processing Systems 31. 4558--4567."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380029"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"e_1_3_2_1_18_1","volume-title":"2020 b. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. ArXiv","author":"Jin Wei","year":"2020","unstructured":"Wei Jin , Yaxin Li , Han Xu , Yiqi Wang , and Jiliang Tang . 2020 b. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. ArXiv , Vol. abs\/ 2003 .00653 ( 2020 ). Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, and Jiliang Tang. 2020 b. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. ArXiv, Vol. abs\/2003.00653 (2020)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"volume-title":"Proceedings of the 5th International Conference on Learning Representations (ICLR '17)","author":"Thomas","key":"e_1_3_2_1_20_1","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks . In Proceedings of the 5th International Conference on Learning Representations (ICLR '17) . Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In Proceedings of the 5th International Conference on Learning Representations (ICLR '17)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 7th International Conference on Learning Representations (ICLR '19)","author":"Klicpera Johannes","year":"2019","unstructured":"Johannes Klicpera , Aleksandar Bojchevski , and Stephan G\u00fcnnemann . 2019 . Predict then Propagate: Graph Neural Networks meet Personalized PageRank . In Proceedings of the 7th International Conference on Learning Representations (ICLR '19) . Johannes Klicpera, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2019. Predict then Propagate: Graph Neural Networks meet Personalized PageRank. In Proceedings of the 7th International Conference on Learning Representations (ICLR '19)."},{"volume-title":"Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '20)","author":"Liu Yang","key":"e_1_3_2_1_22_1","unstructured":"Yang Liu , Xianzhuo Xia , Liang Chen , X. He , Carl Yang , and Z. Zheng . 2020. Certifiable Robustness to Discrete Adversarial Perturbations for Factorization Machines . In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '20) . 419--428. Yang Liu, Xianzhuo Xia, Liang Chen, X. He, Carl Yang, and Z. Zheng. 2020. Certifiable Robustness to Discrete Adversarial Perturbations for Factorization Machines. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '20). 419--428."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220077"},{"volume-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '17)","author":"Ribeiro Leonardo F.R.","key":"e_1_3_2_1_25_1","unstructured":"Leonardo F.R. Ribeiro , Pedro H.P. Saverese , and Daniel R. Figueiredo . 2017. Struc2vec: Learning Node Representations from Structural Identity . In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '17) . 385--394. Leonardo F.R. Ribeiro, Pedro H.P. Saverese, and Daniel R. Figueiredo. 2017. Struc2vec: Learning Node Representations from Structural Identity. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '17). 385--394."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML '19)","author":"Rieck Bastian","year":"2019","unstructured":"Bastian Rieck , Christian Bock , and Karsten Borgwardt . 2019 . A persistent weisfeiler-lehman procedure for graph classification . In Proceedings of the 36th International Conference on Machine Learning (ICML '19) . 5448--5458. Bastian Rieck, Christian Bock, and Karsten Borgwardt. 2019. A persistent weisfeiler-lehman procedure for graph classification. In Proceedings of the 36th International Conference on Machine Learning (ICML '19). 5448--5458."},{"key":"e_1_3_2_1_27_1","volume-title":"Adversarial Attack and Defense on Graph Data: A Survey. ArXiv","author":"Sun Lichao","year":"2018","unstructured":"Lichao Sun , Ji Wang , Philip S. Yu , and Bo Li. 2018. Adversarial Attack and Defense on Graph Data: A Survey. ArXiv , Vol. abs\/ 1812 .10528 ( 2018 ). Lichao Sun, Ji Wang, Philip S. Yu, and Bo Li. 2018. Adversarial Attack and Defense on Graph Data: A Survey. ArXiv, Vol. abs\/1812.10528 (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371851"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR '18)","author":"Petar Velivc","year":"2018","unstructured":"Petar Velivc kovi\u0107, Guillem Cucurull , Arantxa Casanova , Adriana Romero , Pietro Li\u00f2 , and Yoshua Bengio . 2018 . Graph Attention Networks . In Proceedings of the 6th International Conference on Learning Representations (ICLR '18) . Petar Velivc kovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In Proceedings of the 6th International Conference on Learning Representations (ICLR '18)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_1_32_1","volume-title":"Scalable Attack on Graph Data by Injecting Vicious Nodes. arXiv preprint arXiv:2004.13825","author":"Wang Jihong","year":"2020","unstructured":"Jihong Wang , Minnan Luo , Fnu Suya , Jundong Li , Zijiang Yang , and Qinghua Zheng . 2020. Scalable Attack on Graph Data by Injecting Vicious Nodes. arXiv preprint arXiv:2004.13825 ( 2020 ). Jihong Wang, Minnan Luo, Fnu Suya, Jundong Li, Zijiang Yang, and Qinghua Zheng. 2020. Scalable Attack on Graph Data by Injecting Vicious Nodes. arXiv preprint arXiv:2004.13825 (2020)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/267"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 7th International Conference on Learning Representations (ICLR '19)","author":"Xu Bingbing","year":"2019","unstructured":"Bingbing Xu , Huawei Shen , Qi Cao , Yunqi Qiu , and Xueqi Cheng . 2019 c. Graph Wavelet Neural Network . In Proceedings of the 7th International Conference on Learning Representations (ICLR '19) . Bingbing Xu, Huawei Shen, Qi Cao, Yunqi Qiu, and Xueqi Cheng. 2019 c. Graph Wavelet Neural Network. In Proceedings of the 7th International Conference on Learning Representations (ICLR '19)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 8th International Conference on Learning Representations (ICLR '20)","author":"Zeng Hanqing","year":"2020","unstructured":"Hanqing Zeng , Hongkuan Zhou , Ajitesh Srivastava , Rajgopal Kannan , and Viktor Prasanna . 2020 . GraphSAINT: Graph Sampling Based Inductive Learning Method . In Proceedings of the 8th International Conference on Learning Representations (ICLR '20) . Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgopal Kannan, and Viktor Prasanna. 2020. GraphSAINT: Graph Sampling Based Inductive Learning Method. In Proceedings of the 8th International Conference on Learning Representations (ICLR '20)."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. Representation Learning on Graphs and Manifolds Workshop, Int. Conf. Learning Representations","author":"Zhang Yingxue","year":"2019","unstructured":"Yingxue Zhang , S Khan , and Mark Coates . 2019 . Comparing and detecting adversarial attacks for graph deep learning . In Proc. Representation Learning on Graphs and Manifolds Workshop, Int. Conf. Learning Representations , New Orleans, LA, USA (RLGM @ ICLR '19). Yingxue Zhang, S Khan, and Mark Coates. 2019. Comparing and detecting adversarial attacks for graph deep learning. In Proc. Representation Learning on Graphs and Manifolds Workshop, Int. Conf. Learning Representations, New Orleans, LA, USA (RLGM @ ICLR '19)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI '18)","author":"Zhang Yingxue","year":"2018","unstructured":"Yingxue Zhang , Soumyasundar Pal , Mark Coates , and Deniz \u00dcstebay . 2018 . Bayesian graph convolutional neural networks for semi-supervised classification . In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI '18) . 5829--5836. Yingxue Zhang, Soumyasundar Pal, Mark Coates, and Deniz \u00dcstebay. 2018. Bayesian graph convolutional neural networks for semi-supervised classification. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI '18). 5829--5836."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 7th International Conference on Learning Representations (ICLR '19)","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann . 2019 . Adversarial Attacks on Graph Neural Networks via Meta Learning . In Proceedings of the 7th International Conference on Learning Representations (ICLR '19) . Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In Proceedings of the 7th International Conference on Learning Representations (ICLR '19)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330905"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403217"}],"event":{"name":"WSDM '21: The Fourteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Israel","acronym":"WSDM '21"},"container-title":["Proceedings of the 14th ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441782","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437963.3441782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:35Z","timestamp":1750193255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":43,"alternative-id":["10.1145\/3437963.3441782","10.1145\/3437963"],"URL":"https:\/\/doi.org\/10.1145\/3437963.3441782","relation":{},"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"2021-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}