{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:48Z","timestamp":1750220508079,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":107,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3449823","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:34:17Z","timestamp":1622748857000},"page":"3884-3895","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Robust Network Alignment via Attack Signal Scaling and Adversarial Perturbation Elimination"],"prefix":"10.1145","author":[{"given":"Yang","family":"Zhou","sequence":"first","affiliation":[{"name":"Auburn University, USA"}]},{"given":"Zeru","family":"Zhang","sequence":"additional","affiliation":[{"name":"Auburn University, USA"}]},{"given":"Sixing","family":"Wu","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Victor","family":"Sheng","sequence":"additional","affiliation":[{"name":"Texas Tech University, USA"}]},{"given":"Xiaoying","family":"Han","sequence":"additional","affiliation":[{"name":"Auburn University, USA"}]},{"given":"Zijie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Auburn University, USA"}]},{"given":"Ruoming","family":"Jin","sequence":"additional","affiliation":[{"name":"Kent State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[\n  1\n  ]  http:\/\/snap.stanford.edu\/data\/.  [1] http:\/\/snap.stanford.edu\/data\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[\n  2\n  ]  http:\/\/dblp.uni-trier.de\/xml\/.  [2] http:\/\/dblp.uni-trier.de\/xml\/."},{"key":"e_1_3_2_1_3_1","volume-title":"ICML","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Nicholas Carlini , and David\u00a0 A. Wagner . 2018 . Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples . In ICML 2018. 274\u2013283. Anish Athalye, Nicholas Carlini, and David\u00a0A. Wagner. 2018. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. In ICML 2018. 274\u2013283."},{"key":"e_1_3_2_1_4_1","volume-title":"Policy-driven Autonomic Configuration Management for NoSQL. In CLOUD","author":"Bao Xianqiang","year":"2015","unstructured":"Xianqiang Bao , Ling Liu , Nong Xiao , Yang Zhou , and Qi Zhang . 2015 . Policy-driven Autonomic Configuration Management for NoSQL. In CLOUD 2015. Xianqiang Bao, Ling Liu, Nong Xiao, Yang Zhou, and Qi Zhang. 2015. Policy-driven Autonomic Configuration Management for NoSQL. In CLOUD 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"NeurIPS","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann . 2019. Certifiable Robustness to Graph Perturbations . In NeurIPS 2019 . 8317\u20138328. Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Certifiable Robustness to Graph Perturbations. In NeurIPS 2019. 8317\u20138328."},{"key":"e_1_3_2_1_6_1","volume-title":"Images and More. In ICML","author":"Bojchevski Aleksandar","year":"2020","unstructured":"Aleksandar Bojchevski , Johannes Klicpera , and Stephan G\u00fcnnemann . 2020 . Efficient Robustness Certificates for Discrete Data: Sparsity-Aware Randomized Smoothing for Graphs , Images and More. In ICML 2020. Aleksandar Bojchevski, Johannes Klicpera, and Stephan G\u00fcnnemann. 2020. Efficient Robustness Certificates for Discrete Data: Sparsity-Aware Randomized Smoothing for Graphs, Images and More. In ICML 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380204"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"e_1_3_2_1_9_1","volume-title":"Community-Based Network Alignment for Large Attributed Network. In CIKM","author":"Chen Zheng","year":"2017","unstructured":"Zheng Chen , Xinli Yu , Bo Song , Jianliang Gao , Xiaohua Hu , and Wei-Shih Yang . 2017 . Community-Based Network Alignment for Large Attributed Network. In CIKM 2017. 587\u2013596. Zheng Chen, Xinli Yu, Bo Song, Jianliang Gao, Xiaohua Hu, and Wei-Shih Yang. 2017. Community-Based Network Alignment for Large Attributed Network. In CIKM 2017. 587\u2013596."},{"key":"e_1_3_2_1_10_1","volume-title":"Identifying Bug Signatures Using Discriminative Graph Mining. In ISSTA","author":"Cheng Hong","year":"2009","unstructured":"Hong Cheng , David Lo , Yang Zhou , Xiaoyin Wang , and Xifeng Yan . 2009 . Identifying Bug Signatures Using Discriminative Graph Mining. In ISSTA 2009. Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, and Xifeng Yan. 2009. Identifying Bug Signatures Using Discriminative Graph Mining. In ISSTA 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0263-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Hong Cheng Yang Zhou and Jeffrey\u00a0Xu Yu. 2011. Clustering Large Attributed Graphs: A Balance Between Structural and Attribute Similarities. ACM Transactions on Knowledge Discovery from Data (TKDD) 5 2(2011) 1\u201333.  Hong Cheng Yang Zhou and Jeffrey\u00a0Xu Yu. 2011. Clustering Large Attributed Graphs: A Balance Between Structural and Attribute Similarities. ACM Transactions on Knowledge Discovery from Data (TKDD) 5 2(2011) 1\u201333.","DOI":"10.1145\/1921632.1921638"},{"key":"e_1_3_2_1_13_1","volume-title":"Jingping Bi. Cross-Network Embedding for Multi-Network Alignment. In WWW","author":"Chu Xiaokai","year":"2019","unstructured":"Xiaokai Chu , Xinxin Fan , Di Yao , Zhihua Zhu , Jianhui Huang , and Jingping Bi. Cross-Network Embedding for Multi-Network Alignment. In WWW 2019 . Xiaokai Chu, Xinxin Fan, Di Yao, Zhihua Zhu, Jianhui Huang, and Jingping Bi. Cross-Network Embedding for Multi-Network Alignment. In WWW 2019."},{"key":"e_1_3_2_1_14_1","volume-title":"Adversarial Attack on Graph Structured Data. In ICML","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai , Hui Li , Tian Tian , Xin Huang , Lin Wang , Jun Zhu , and Le Song . 2018 . Adversarial Attack on Graph Structured Data. In ICML 2018. 1123\u20131132. Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial Attack on Graph Structured Data. In ICML 2018. 1123\u20131132."},{"key":"e_1_3_2_1_15_1","volume-title":"Adversarial Training Methods for Network Embedding. In WWW","author":"Dai Quanyu","year":"2019","unstructured":"Quanyu Dai , Xiao Shen , Liang Zhang , Qiang Li , and Dan Wang . 2019 . Adversarial Training Methods for Network Embedding. In WWW 2019. 329\u2013339. Quanyu Dai, Xiao Shen, Liang Zhang, Qiang Li, and Dan Wang. 2019. Adversarial Training Methods for Network Embedding. In WWW 2019. 329\u2013339."},{"volume-title":"The Principles of Quantum Mechanics","author":"Dirac Paul","key":"e_1_3_2_1_16_1","unstructured":"Paul Dirac . 1930. The Principles of Quantum Mechanics . Oxford University Press . Paul Dirac. 1930. The Principles of Quantum Mechanics. Oxford University Press."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403135"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/312"},{"key":"e_1_3_2_1_19_1","volume-title":"NeurIPS","author":"Elinas Pantelis","year":"2020","unstructured":"Pantelis Elinas , Edwin\u00a0 V. Bonilla , and Louis Tiao . 2020. Variational Inference for Graph Convolutional Networks in the Absence of Graph Data and Adversarial Settings . In NeurIPS 2020 . Pantelis Elinas, Edwin\u00a0V. Bonilla, and Louis Tiao. 2020. Variational Inference for Graph Convolutional Networks in the Absence of Graph Data and Adversarial Settings. In NeurIPS 2020."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"e_1_3_2_1_21_1","volume-title":"Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. (TKDE)","author":"Feng Fuli","year":"2020","unstructured":"Fuli Feng , Xiangnan He , Jie Tang , and Tat-Seng Chua . 2020. Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. (TKDE) ( 2020 ). Fuli Feng, Xiangnan He, Jie Tang, and Tat-Seng Chua. 2020. Graph Adversarial Training: Dynamically Regularizing Based on Graph Structure. (TKDE) (2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"WWW","author":"Feng Jie","year":"2019","unstructured":"Jie Feng , Mingyang Zhang , Huandong Wang , Zeyu Yang , Chao Zhang , Yong Li , and Depeng Jin . 2019 . DPLink: User Identity Linkage via Deep Neural Network From Heterogeneous Mobility Data . In WWW 2019. 459\u2013469. Jie Feng, Mingyang Zhang, Huandong Wang, Zeyu Yang, Chao Zhang, Yong Li, and Depeng Jin. 2019. DPLink: User Identity Linkage via Deep Neural Network From Heterogeneous Mobility Data. In WWW 2019. 459\u2013469."},{"key":"e_1_3_2_1_23_1","volume-title":"NeurIPS","author":"Feng Wenzheng","year":"2020","unstructured":"Wenzheng Feng , Jie Zhang , Yuxiao Dong , Yu Han , Huanbo Luan , Qian Xu , Qiang Yang , Evgeny Kharlamov , and Jie Tang . 2020. Graph Random Neural Networks for Semi-Supervised Learning on Graphs . In NeurIPS 2020 . Wenzheng Feng, Jie Zhang, Yuxiao Dong, Yu Han, Huanbo Luan, Qian Xu, Qiang Yang, Evgeny Kharlamov, and Jie Tang. 2020. Graph Random Neural Networks for Semi-Supervised Learning on Graphs. In NeurIPS 2020."},{"key":"e_1_3_2_1_24_1","volume-title":"Deep Graph Matching Consensus. In ICLR","author":"Fey Matthias","year":"2020","unstructured":"Matthias Fey , Jan\u00a0Eric Lenssen , Christopher Morris , Jonathan Masci , and Nils\u00a0 M. Kriege . 2020 . Deep Graph Matching Consensus. In ICLR 2020. Matthias Fey, Jan\u00a0Eric Lenssen, Christopher Morris, Jonathan Masci, and Nils\u00a0M. Kriege. 2020. Deep Graph Matching Consensus. In ICLR 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"Explaining and Harnessing Adversarial Examples. In ICLR","author":"Goodfellow J.","year":"2015","unstructured":"Ian\u00a0 J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In ICLR 2015. Ian\u00a0J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR 2015."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03097-w"},{"key":"e_1_3_2_1_27_1","volume-title":"An Efficient Algorithm for Mining Both Closed and Maximal Frequent Free Subtrees Using Canonical Forms. In ADMA","author":"Guo Ping","year":"2005","unstructured":"Ping Guo , Yang Zhou , Jun Zhuang , Ting Chen , and Yan-Rong Kang . 2005 . An Efficient Algorithm for Mining Both Closed and Maximal Frequent Free Subtrees Using Canonical Forms. In ADMA 2005. Wuhan, China, 96\u2013107. Ping Guo, Yang Zhou, Jun Zhuang, Ting Chen, and Yan-Rong Kang. 2005. An Efficient Algorithm for Mining Both Closed and Maximal Frequent Free Subtrees Using Canonical Forms. In ADMA 2005. Wuhan, China, 96\u2013107."},{"key":"e_1_3_2_1_28_1","first-page":"117","article-title":"REGAL","volume":"2018","author":"Heimann Mark","year":"2018","unstructured":"Mark Heimann , Haoming Shen , Tara Safavi , and Danai Koutra . 2018 . REGAL : Representation Learning-based Graph Alignment. In CIKM 2018. 117 \u2013 126 . Mark Heimann, Haoming Shen, Tara Safavi, and Danai Koutra. 2018. REGAL: Representation Learning-based Graph Alignment. In CIKM 2018. 117\u2013126.","journal-title":"Representation Learning-based Graph Alignment. In CIKM"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357875"},{"key":"e_1_3_2_1_30_1","volume-title":"Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE","author":"Huynh Thanh\u00a0Trung","year":"2020","unstructured":"Thanh\u00a0Trung Huynh , Van\u00a0Vinh Tong , Thanh\u00a0Tam Nguyen , Hongzhi Yin , Matthias Weidlich , and Nguyen Quoc\u00a0Viet Hung . 2020 . Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE 2020. 85\u201396. Thanh\u00a0Trung Huynh, Van\u00a0Vinh Tong, Thanh\u00a0Tam Nguyen, Hongzhi Yin, Matthias Weidlich, and Nguyen Quoc\u00a0Viet Hung. 2020. Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE 2020. 85\u201396."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380029"},{"key":"e_1_3_2_1_32_1","volume-title":"Venkata Jaya Shankar\u00a0Ashish Peruri, and Xinhua Zhang","author":"Jin Hongwei","year":"2020","unstructured":"Hongwei Jin , Zhan Shi , Venkata Jaya Shankar\u00a0Ashish Peruri, and Xinhua Zhang . 2020 . Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks. In NeurIPS 2020. Hongwei Jin, Zhan Shi, Venkata Jaya Shankar\u00a0Ashish Peruri, and Xinhua Zhang. 2020. Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks. In NeurIPS 2020."},{"key":"e_1_3_2_1_33_1","volume-title":"Latent Adversarial Training of Graph Convolution Networks. In ICML","author":"Jin Hongwei","year":"2019","unstructured":"Hongwei Jin and Xinhua Zhang . 2019 . Latent Adversarial Training of Graph Convolution Networks. In ICML 2019. Hongwei Jin and Xinhua Zhang. 2019. Latent Adversarial Training of Graph Convolution Networks. In ICML 2019."},{"key":"e_1_3_2_1_34_1","volume-title":"Jiliang Tang. Graph Structure Learning for Robust Graph Neural Networks. In KDD","author":"Jin Wei","year":"2020","unstructured":"Wei Jin , Yao Ma , Xiaorui Liu , Xianfeng Tang , Suhang Wang , and Jiliang Tang. Graph Structure Learning for Robust Graph Neural Networks. In KDD 2020 . Wei Jin, Yao Ma, Xiaorui Liu, Xianfeng Tang, Suhang Wang, and Jiliang Tang. Graph Structure Learning for Robust Graph Neural Networks. In KDD 2020."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1534710100"},{"key":"e_1_3_2_1_36_1","first-page":"1","article-title":"Scaling Iterative Graph Computations with GraphMap. In SC 2015. Austin","volume":"57","author":"Lee Kisung","year":"2015","unstructured":"Kisung Lee , Ling Liu , Karsten Schwan , Calton Pu , Qi Zhang , Yang Zhou , Emre Yigitoglu , and Pingpeng Yuan . 2015 . Scaling Iterative Graph Computations with GraphMap. In SC 2015. Austin , TX , 57 : 1 \u2013 57 :12. Kisung Lee, Ling Liu, Karsten Schwan, Calton Pu, Qi Zhang, Yang Zhou, Emre Yigitoglu, and Pingpeng Yuan. 2015. Scaling Iterative Graph Computations with GraphMap. In SC 2015. Austin, TX, 57:1\u201357:12.","journal-title":"TX"},{"key":"e_1_3_2_1_37_1","volume-title":"Efficient and Customizable Data Partitioning Framework for Distributed Big RDF Data Processing in the Cloud. In CLOUD","author":"Lee Kisung","year":"2013","unstructured":"Kisung Lee , Ling Liu , Yuzhe Tang , Qi Zhang , and Yang Zhou . 2013 . Efficient and Customizable Data Partitioning Framework for Distributed Big RDF Data Processing in the Cloud. In CLOUD 2013. Santa Clara, CA, 327\u2013334. Kisung Lee, Ling Liu, Yuzhe Tang, Qi Zhang, and Yang Zhou. 2013. Efficient and Customizable Data Partitioning Framework for Distributed Big RDF Data Processing in the Cloud. In CLOUD 2013. Santa Clara, CA, 327\u2013334."},{"key":"e_1_3_2_1_38_1","volume-title":"Frontiers in Artificial Intelligence","author":"Li Yuexin","year":"2021","unstructured":"Yuexin Li , Linqiang Ge , Yang Zhou , Xuan Cao , and Jingyi Zheng . 2021 . Towards the Impact of Non-pharmaceutical Interventions and Vaccination on the spread of COVID-19 with Time-dependent SEIR Model . Frontiers in Artificial Intelligence , (2021). Yuexin Li, Linqiang Ge, Yang Zhou, Xuan Cao, and Jingyi Zheng. 2021. Towards the Impact of Non-pharmaceutical Interventions and Vaccination on the spread of COVID-19 with Time-dependent SEIR Model. Frontiers in Artificial Intelligence, (2021)."},{"key":"e_1_3_2_1_39_1","volume-title":"Partially Shared Adversarial Learning For Semi-supervised Multi-platform User Identity Linkage. In CIKM","author":"Li Chaozhuo","year":"2019","unstructured":"Chaozhuo Li , Senzhang Wang , Hao Wang , Yanbo Liang , Philip\u00a0 S. Yu , Zhoujun Li , and Wei Wang . 2019 . Partially Shared Adversarial Learning For Semi-supervised Multi-platform User Identity Linkage. In CIKM 2019. 249\u2013258. Chaozhuo Li, Senzhang Wang, Hao Wang, Yanbo Liang, Philip\u00a0S. Yu, Zhoujun Li, and Wei Wang. 2019. Partially Shared Adversarial Learning For Semi-supervised Multi-platform User Identity Linkage. In CIKM 2019. 249\u2013258."},{"key":"e_1_3_2_1_40_1","volume-title":"Adversarial Learning for Weakly-Supervised Social Network Alignment. In AAAI","author":"Li Chaozhuo","year":"2019","unstructured":"Chaozhuo Li , Senzhang Wang , Yukun Wang , Philip\u00a0 S. Yu , Yanbo Liang , Yun Liu , and Zhoujun Li . 2019 . Adversarial Learning for Weakly-Supervised Social Network Alignment. In AAAI 2019. 996\u20131003. Chaozhuo Li, Senzhang Wang, Yukun Wang, Philip\u00a0S. Yu, Yanbo Liang, Yun Liu, and Zhoujun Li. 2019. Adversarial Learning for Weakly-Supervised Social Network Alignment. In AAAI 2019. 996\u20131003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380171"},{"key":"e_1_3_2_1_42_1","volume-title":"Novel Geometric Approach for Global Alignment of PPI Networks. In AAAI 201731\u201337","author":"Liu Yangwei","year":"2017","unstructured":"Yangwei Liu , Hu Ding , Danyang Chen , and Jinhui Xu . 2017 . Novel Geometric Approach for Global Alignment of PPI Networks. In AAAI 201731\u201337 . Yangwei Liu, Hu Ding, Danyang Chen, and Jinhui Xu. 2017. Novel Geometric Approach for Global Alignment of PPI Networks. In AAAI 201731\u201337."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380028"},{"key":"e_1_3_2_1_44_1","volume-title":"ICLR","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In ICLR 2018. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In ICLR 2018."},{"key":"e_1_3_2_1_45_1","volume-title":"NIPS","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Gregory\u00a0 S. Corrado , and Jeffrey Dean . 2013 . Distributed Representations of Words and Phrases and their Compositionality . In NIPS 2013. 3111\u20133119. Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory\u00a0S. Corrado, and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In NIPS 2013. 3111\u20133119."},{"key":"e_1_3_2_1_46_1","volume-title":"Low Rank Spectral Network Alignment. In WWW","author":"Nassar Huda","year":"2018","unstructured":"Huda Nassar , Nate Veldt , Shahin Mohammadi , Ananth Grama , and David\u00a0 F. Gleich . 2018 . Low Rank Spectral Network Alignment. In WWW 2018. 619\u2013628. Huda Nassar, Nate Veldt, Shahin Mohammadi, Ananth Grama, and David\u00a0F. Gleich. 2018. Low Rank Spectral Network Alignment. In WWW 2018. 619\u2013628."},{"key":"e_1_3_2_1_47_1","volume-title":"Anonymizing Continuous Queries with Delay-tolerant Mix-zones over Road Networks. Distributed and Parallel Databases (DAPD) 32, 1","author":"Palanisamy Balaji","year":"2014","unstructured":"Balaji Palanisamy , Ling Liu , Kisung Lee , Shicong Meng , Yuzhe Tang , and Yang Zhou . Anonymizing Continuous Queries with Delay-tolerant Mix-zones over Road Networks. Distributed and Parallel Databases (DAPD) 32, 1 ( 2014 ), 91\u2013118. Balaji Palanisamy, Ling Liu, Kisung Lee, Shicong Meng, Yuzhe Tang, and Yang Zhou. Anonymizing Continuous Queries with Delay-tolerant Mix-zones over Road Networks. Distributed and Parallel Databases (DAPD) 32, 1 (2014), 91\u2013118."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125622"},{"key":"e_1_3_2_1_49_1","volume-title":"NIPS","author":"Pennington Jeffrey","year":"2017","unstructured":"Jeffrey Pennington , Samuel\u00a0 S. Schoenholz , and Surya Ganguli . 2017 . Resurrecting the sigmoid in deep learning through dynamical isometry: theory and practice . In NIPS 2017. 4785\u20134795. Jeffrey Pennington, Samuel\u00a0S. Schoenholz, and Surya Ganguli. 2017. Resurrecting the sigmoid in deep learning through dynamical isometry: theory and practice. In NIPS 2017. 4785\u20134795."},{"key":"e_1_3_2_1_50_1","first-page":"198","article-title":"Mining Maximal and Closed Frequent Free Subtrees. Dynamics of Continuous, Discrete and Impulsive Systems (DCDIS)","volume":"14","author":"Ping Guo","year":"2007","unstructured":"Guo Ping , Zhou Yang , and Jun Zhuang . 2007 . Mining Maximal and Closed Frequent Free Subtrees. Dynamics of Continuous, Discrete and Impulsive Systems (DCDIS) , Series B: Applications and Algorithms 14 , S1 (2007), 198 \u2013 205 . Guo Ping, Zhou Yang, and Jun Zhuang. 2007. Mining Maximal and Closed Frequent Free Subtrees. Dynamics of Continuous, Discrete and Impulsive Systems (DCDIS), Series B: Applications and Algorithms 14, S1 (2007), 198\u2013205.","journal-title":"Series B: Applications and Algorithms"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/200"},{"key":"e_1_3_2_1_52_1","volume-title":"Dual Adversarial Learning Based Network Alignment. In ICDM","author":"Ren Jiaxiang","year":"2019","unstructured":"Jiaxiang Ren , Yang Zhou , Ruoming Jin , Zijie Zhang , Dejing Dou , and Pengwei Wang . 2019 . Dual Adversarial Learning Based Network Alignment. In ICDM 2019. Beijing, China, 1288\u20131293. Jiaxiang Ren, Yang Zhou, Ruoming Jin, Zijie Zhang, Dejing Dou, and Pengwei Wang. 2019. Dual Adversarial Learning Based Network Alignment. In ICDM 2019. Beijing, China, 1288\u20131293."},{"key":"e_1_3_2_1_53_1","volume-title":"ServiceTrust: Trust Management in Service Provision Networks. In SCC","author":"Su Zhiyuan","year":"2013","unstructured":"Zhiyuan Su , Ling Liu , Mingchu Li , Xinxin Fan , and Yang Zhou . 2013 . ServiceTrust: Trust Management in Service Provision Networks. In SCC 2013. Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, and Yang Zhou. 2013. ServiceTrust: Trust Management in Service Provision Networks. In SCC 2013."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2754934"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006004"},{"key":"e_1_3_2_1_56_1","volume-title":"Transferring Robustness for Graph Neural Network Against Poisoning Attacks. In WSDM","author":"Tang Xianfeng","year":"2020","unstructured":"Xianfeng Tang , Yandong Li , Yiwei Sun , Huaxiu Yao , Prasenjit Mitra , and Suhang Wang . 2020 . Transferring Robustness for Graph Neural Network Against Poisoning Attacks. In WSDM 2020. Xianfeng Tang, Yandong Li, Yiwei Sun, Huaxiu Yao, Prasenjit Mitra, and Suhang Wang. 2020. Transferring Robustness for Graph Neural Network Against Poisoning Attacks. In WSDM 2020."},{"key":"e_1_3_2_1_57_1","volume-title":"Zero-Assignment Constraint for Graph Matching With Outliers. In CVPR","author":"Wang Fudong","year":"2020","unstructured":"Fudong Wang , Nan Xue , Jin-Gang Yu , and Gui-Song Xia . 2020 . Zero-Assignment Constraint for Graph Matching With Outliers. In CVPR 2020. 3030\u20133039. Fudong Wang, Nan Xue, Jin-Gang Yu, and Gui-Song Xia. 2020. Zero-Assignment Constraint for Graph Matching With Outliers. In CVPR 2020. 3030\u20133039."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00696-7"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"e_1_3_2_1_60_1","volume-title":"Diverse and Informative Dialogue Generation with Context-Specific Commonsense Knowledge Awareness. In ACL","author":"Wu Sixing","year":"2020","unstructured":"Sixing Wu , Ying Li , Dawei Zhang , Yang Zhou , and Zhonghai Wu . 2020 . Diverse and Informative Dialogue Generation with Context-Specific Commonsense Knowledge Awareness. In ACL 2020. Online, 5811\u20135820. Sixing Wu, Ying Li, Dawei Zhang, Yang Zhou, and Zhonghai Wu. 2020. Diverse and Informative Dialogue Generation with Context-Specific Commonsense Knowledge Awareness. In ACL 2020. Online, 5811\u20135820."},{"key":"e_1_3_2_1_61_1","volume-title":"TopicKA: Generating Commonsense Knowledge-Aware Dialogue Responses Towards the Recommended Topic Fact. In IJCAI","author":"Wu Sixing","year":"2021","unstructured":"Sixing Wu , Ying Li , Dawei Zhang , Yang Zhou , and Zhonghai Wu . 2021 . TopicKA: Generating Commonsense Knowledge-Aware Dialogue Responses Towards the Recommended Topic Fact. In IJCAI 2020. Online, 3766\u20133772. Sixing Wu, Ying Li, Dawei Zhang, Yang Zhou, and Zhonghai Wu. 2021. TopicKA: Generating Commonsense Knowledge-Aware Dialogue Responses Towards the Recommended Topic Fact. In IJCAI 2020. Online, 3766\u20133772."},{"key":"e_1_3_2_1_62_1","volume-title":"Gromov-Wasserstein Learning for Graph Matching and Node Embedding. In ICML","author":"Xu Hongteng","year":"2019","unstructured":"Hongteng Xu , Dixin Luo , Hongyuan Zha , and Lawrence Carin . 2019 . Gromov-Wasserstein Learning for Graph Matching and Node Embedding. In ICML 2019. Hongteng Xu, Dixin Luo, Hongyuan Zha, and Lawrence Carin. 2019. Gromov-Wasserstein Learning for Graph Matching and Node Embedding. In ICML 2019."},{"key":"e_1_3_2_1_63_1","first-page":"3961","article-title":"Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective","volume":"2019","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu , Hongge Chen , Sijia Liu , Pin-Yu Chen , Tsui-Wei Weng , Mingyi Hong , and Xue Lin . 2019 . Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective . In IJCAI 2019. 3961 \u2013 3967 . Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. In IJCAI 2019. 3961\u20133967.","journal-title":"IJCAI"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1304"},{"key":"e_1_3_2_1_65_1","volume-title":"An Iterative Global Structure-Assisted Labeled Network Aligner. In KDD","author":"Abdurrahman","year":"2018","unstructured":"Abdurrahman Yasar and \u00dcmit\u00a0V. \u00c7ataly\u00fcrek. 2018 . An Iterative Global Structure-Assisted Labeled Network Aligner. In KDD 2018 . 2614\u20132623. Abdurrahman Yasar and \u00dcmit\u00a0V. \u00c7ataly\u00fcrek. 2018. An Iterative Global Structure-Assisted Labeled Network Aligner. In KDD 2018. 2614\u20132623."},{"key":"e_1_3_2_1_66_1","volume-title":"ICLR","author":"Yu Tianshu","year":"2020","unstructured":"Tianshu Yu , Runzhong Wang , Junchi Yan , and Baoxin Li . 2020 . Learning deep graph matching with channel-independent embedding and Hungarian attention . In ICLR 2020. Tianshu Yu, Runzhong Wang, Junchi Yan, and Baoxin Li. 2020. Learning deep graph matching with channel-independent embedding and Hungarian attention. In ICLR 2020."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcp.2009.11.030"},{"key":"e_1_3_2_1_68_1","first-page":"1345","article-title":"FINAL","volume":"2016","author":"Zhang Si","year":"2016","unstructured":"Si Zhang and Hanghang Tong . 2016 . FINAL : Fast Attributed Network Alignment. In KDD 2016. 1345 \u2013 1354 . Si Zhang and Hanghang Tong. 2016. FINAL: Fast Attributed Network Alignment. In KDD 2016. 1345\u20131354.","journal-title":"Fast Attributed Network Alignment. In KDD"},{"key":"e_1_3_2_1_69_1","volume-title":"Multilevel Network Alignment. In WWW","author":"Zhang Si","year":"2019","unstructured":"Si Zhang , Hanghang Tong , Ross Maciejewski , and Tina Eliassi-Rad . 2019 . Multilevel Network Alignment. In WWW 2019. 2344\u20132354. Si Zhang, Hanghang Tong, Ross Maciejewski, and Tina Eliassi-Rad. 2019. Multilevel Network Alignment. In WWW 2019. 2344\u20132354."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.160"},{"key":"e_1_3_2_1_71_1","volume-title":"GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. In SIGIR","author":"Zhang Shijie","year":"2020","unstructured":"Shijie Zhang , Hongzhi Yin , Tong Chen , Quoc Viet\u00a0Nguyen Hung , Zi Huang , and Lizhen Cui . 2020 . GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. In SIGIR 2020. 689\u2013698. Shijie Zhang, Hongzhi Yin, Tong Chen, Quoc Viet\u00a0Nguyen Hung, Zi Huang, and Lizhen Cui. 2020. GCN-Based User Representation Learning for Unifying Robust Recommendation and Fraudster Detection. In SIGIR 2020. 689\u2013698."},{"key":"e_1_3_2_1_72_1","volume-title":"NeurIPS","author":"Zhang Xiang","year":"2020","unstructured":"Xiang Zhang and Marinka Zitnik . 2020. GNNGuard: Defending Graph Neural Networks against Adversarial Attacks . In NeurIPS 2020 . Xiang Zhang and Marinka Zitnik. 2020. GNNGuard: Defending Graph Neural Networks against Adversarial Attacks. In NeurIPS 2020."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"key":"e_1_3_2_1_74_1","volume-title":"NeurIPS","author":"Zhang Zijie","year":"2020","unstructured":"Zijie Zhang , Zeru Zhang , Yang Zhou , Yelong Shen , Ruoming Jin , and Dejing Dou . 2020. Adversarial Attacks on Deep Graph Matching . In NeurIPS 2020 . Zijie Zhang, Zeru Zhang, Yang Zhou, Yelong Shen, Ruoming Jin, and Dejing Dou. 2020. Adversarial Attacks on Deep Graph Matching. In NeurIPS 2020."},{"key":"e_1_3_2_1_75_1","volume-title":"ICML","author":"Zheng Cheng","year":"2020","unstructured":"Cheng Zheng , Bo Zong , Wei Cheng , Dongjin Song , Jingchao Ni , Wenchao Yu , Haifeng Chen , and Wei Wang . 2020 . Robust Graph Representation Learning via Neural Sparsification . In ICML 2020. Cheng Zheng, Bo Zong, Wei Cheng, Dongjin Song, Jingchao Ni, Wenchao Yu, Haifeng Chen, and Wei Wang. 2020. Robust Graph Representation Learning via Neural Sparsification. In ICML 2020."},{"key":"e_1_3_2_1_76_1","first-page":"5714","article-title":"CoLink: An Unsupervised Framework for User Identity Linkage","volume":"2018","author":"Zhong Zexuan","year":"2018","unstructured":"Zexuan Zhong , Yong Cao , Mu Guo , and Zaiqing Nie . 2018 . CoLink: An Unsupervised Framework for User Identity Linkage . In AAAI 2018. 5714 \u2013 5721 . Zexuan Zhong, Yong Cao, Mu Guo, and Zaiqing Nie. 2018. CoLink: An Unsupervised Framework for User Identity Linkage. In AAAI 2018. 5714\u20135721.","journal-title":"AAAI"},{"key":"e_1_3_2_1_77_1","first-page":"1313","article-title":"DeepLink: A Deep Learning Approach for User Identity Linkage","volume":"2018","author":"Zhou Fan","year":"2018","unstructured":"Fan Zhou , Lei Liu , Kunpeng Zhang , Goce Trajcevski , Jin Wu , and Ting Zhong . 2018 . DeepLink: A Deep Learning Approach for User Identity Linkage . In INFOCOM 2018. 1313 \u2013 1321 . Fan Zhou, Lei Liu, Kunpeng Zhang, Goce Trajcevski, Jin Wu, and Ting Zhong. 2018. DeepLink: A Deep Learning Approach for User Identity Linkage. In INFOCOM 2018. 1313\u20131321.","journal-title":"INFOCOM"},{"key":"e_1_3_2_1_78_1","volume-title":"Adversarial Robustness of Similarity-Based Link Prediction. In ICDM","author":"Zhou Kai","year":"2019","unstructured":"Kai Zhou , Tomasz\u00a0 P. Michalak , and Yevgeniy Vorobeychik . 2019 . Adversarial Robustness of Similarity-Based Link Prediction. In ICDM 2019. Kai Zhou, Tomasz\u00a0P. Michalak, and Yevgeniy Vorobeychik. 2019. Adversarial Robustness of Similarity-Based Link Prediction. In ICDM 2019."},{"key":"e_1_3_2_1_79_1","volume-title":"UAI","author":"Zhou Kai","year":"2020","unstructured":"Kai Zhou and Yevgeniy Vorobeychik . 2020 . Robust Collective Classification against Structural Attacks . In UAI 2020. 119. Kai Zhou and Yevgeniy Vorobeychik. 2020. Robust Collective Classification against Structural Attacks. In UAI 2020. 119."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2784430"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621992"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687709"},{"key":"e_1_3_2_1_84_1","first-page":"689","article-title":"Clustering Large Attributed Graphs","volume":"2010","author":"Zhou Yang","year":"2010","unstructured":"Yang Zhou , Hong Cheng , and Jeffrey\u00a0Xu Yu . 2010 . Clustering Large Attributed Graphs : An Efficient Incremental Approach. In ICDM 2010. 689 \u2013 698 . Yang Zhou, Hong Cheng, and Jeffrey\u00a0Xu Yu. 2010. Clustering Large Attributed Graphs: An Efficient Incremental Approach. In ICDM 2010. 689\u2013698.","journal-title":"An Efficient Incremental Approach. In ICDM"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006299"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34980-6_35"},{"volume-title":"Data Mining: Foundations and Intelligent Paradigms: Volume 1: Clustering, Association and Classification. 7\u201327","author":"Zhou Yang","key":"e_1_3_2_1_87_1","unstructured":"Yang Zhou and Ling Liu . 2012. Clustering Analysis in Large Graphs with Rich Attributes . In Data Mining: Foundations and Intelligent Paradigms: Volume 1: Clustering, Association and Classification. 7\u201327 . Springer . Yang Zhou and Ling Liu. 2012. Clustering Analysis in Large Graphs with Rich Attributes. In Data Mining: Foundations and Intelligent Paradigms: Volume 1: Clustering, Association and Classification. 7\u201327. Springer."},{"key":"e_1_3_2_1_88_1","volume-title":"Social Influence Based Clustering of Heterogeneous Information Networks. In KDD","author":"Zhou Yang","year":"2013","unstructured":"Yang Zhou and Ling Liu . 2013 . Social Influence Based Clustering of Heterogeneous Information Networks. In KDD 2013. 338\u2013346. Yang Zhou and Ling Liu. 2013. Social Influence Based Clustering of Heterogeneous Information Networks. In KDD 2013. 338\u2013346."},{"key":"e_1_3_2_1_89_1","volume-title":"Activity-edge Centric Multi-label Classification for Mining Heterogeneous Information Networks. In KDD","author":"Zhou Yang","year":"2014","unstructured":"Yang Zhou and Ling Liu . 2014 . Activity-edge Centric Multi-label Classification for Mining Heterogeneous Information Networks. In KDD 2014. 1276\u20131285. Yang Zhou and Ling Liu. 2014. Activity-edge Centric Multi-label Classification for Mining Heterogeneous Information Networks. In KDD 2014. 1276\u20131285."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"crossref","unstructured":"Yang Zhou and Ling Liu. 2015. Social Influence Based Clustering and Optimization over Heterogeneous Information Networks. ACM Transactions on Knowledge Discovery from Data (TKDD) 10 1(2015) 1\u201353.  Yang Zhou and Ling Liu. 2015. Social Influence Based Clustering and Optimization over Heterogeneous Information Networks. ACM Transactions on Knowledge Discovery from Data (TKDD) 10 1(2015) 1\u201353.","DOI":"10.1145\/2717314"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/CogMI48466.2019.00016"},{"key":"e_1_3_2_1_92_1","volume-title":"Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis. In KDD","author":"Zhou Yang","year":"2015","unstructured":"Yang Zhou , Ling Liu , and David Buttler . 2015 . Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis. In KDD 2015. 1563\u20131572. Yang Zhou, Ling Liu, and David Buttler. 2015. Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis. In KDD 2015. 1563\u20131572."},{"key":"e_1_3_2_1_93_1","volume-title":"Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks. ACM Transactions on Internet Technology (TOIT) 20, 4","author":"Zhou Yang","year":"2020","unstructured":"Yang Zhou , Ling Liu , Kisung Lee , Balaji Palanisamy , and Qi Zhang . Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks. ACM Transactions on Internet Technology (TOIT) 20, 4 ( 2020 ), 1\u201329. Yang Zhou, Ling Liu, Kisung Lee, Balaji Palanisamy, and Qi Zhang. Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks. ACM Transactions on Internet Technology (TOIT) 20, 4 (2020), 1\u201329."},{"key":"e_1_3_2_1_94_1","volume-title":"Fast Iterative Graph Computation with Resource Aware Graph Parallel Abstractions. In HPDC","author":"Zhou Yang","year":"2015","unstructured":"Yang Zhou , Ling Liu , Kisung Lee , Calton Pu , and Qi Zhang . 2015 . Fast Iterative Graph Computation with Resource Aware Graph Parallel Abstractions. In HPDC 2015. 179\u2013190. Yang Zhou, Ling Liu, Kisung Lee, Calton Pu, and Qi Zhang. 2015. Fast Iterative Graph Computation with Resource Aware Graph Parallel Abstractions. In HPDC 2015. 179\u2013190."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.14778\/2809974.2809987"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2013.14"},{"key":"e_1_3_2_1_97_1","volume-title":"Attribute and Link Heterogeneity. In ICWS","author":"Zhou Yang","year":"2015","unstructured":"Yang Zhou , Ling Liu , Calton Pu , Xianqiang Bao , Kisung Lee , Balaji Palanisamy , Emre Yigitoglu , and Qi Zhang . 2015 . Clustering Service Networks with Entity , Attribute and Link Heterogeneity. In ICWS 2015. New York, NY, 257\u2013264. Yang Zhou, Ling Liu, Calton Pu, Xianqiang Bao, Kisung Lee, Balaji Palanisamy, Emre Yigitoglu, and Qi Zhang. 2015. Clustering Service Networks with Entity, Attribute and Link Heterogeneity. In ICWS 2015. New York, NY, 257\u2013264."},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525478"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00192"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377929"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005595"},{"key":"e_1_3_2_1_102_1","first-page":"1","article-title":"GraphLens","volume":"2014","author":"Zhou Yang","year":"2014","unstructured":"Yang Zhou , Sangeetha Seshadri , Lawrence Chiu , and Ling Liu . 2014 . GraphLens : Mining Enterprise Storage Workloads Using Graph Analytics. In BigData 2014. 1 \u2013 8 . Yang Zhou, Sangeetha Seshadri, Lawrence Chiu, and Ling Liu. 2014. GraphLens: Mining Enterprise Storage Workloads Using Graph Analytics. In BigData 2014. 1\u20138.","journal-title":"Mining Enterprise Storage Workloads Using Graph Analytics. In BigData"},{"key":"e_1_3_2_1_103_1","volume-title":"Density-adaptive Local Edge Representation Learning with Generative Adversarial Network Multi-label Edge Classification. In ICDM","author":"Zhou Yang","year":"2018","unstructured":"Yang Zhou , Sixing Wu , Chao Jiang , Zijie Zhang , Dejing Dou , Ruoming Jin , and Pengwei Wang . 2018 . Density-adaptive Local Edge Representation Learning with Generative Adversarial Network Multi-label Edge Classification. In ICDM 2018. 1464\u20131469. Yang Zhou, Sixing Wu, Chao Jiang, Zijie Zhang, Dejing Dou, Ruoming Jin, and Pengwei Wang. 2018. Density-adaptive Local Edge Representation Learning with Generative Adversarial Network Multi-label Edge Classification. In ICDM 2018. 1464\u20131469."},{"key":"e_1_3_2_1_104_1","volume-title":"Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD","author":"Zhu Dingyuan","year":"2019","unstructured":"Dingyuan Zhu , Ziwei Zhang , Peng Cui , and Wenwu Zhu . 2019 . Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD 2019. 1399\u20131407. Dingyuan Zhu, Ziwei Zhang, Peng Cui, and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD 2019. 1399\u20131407."},{"key":"e_1_3_2_1_105_1","volume-title":"Neighborhood-Aware Attentional Representation for Multilingual Knowledge Graphs. In IJCAI 2019. 1943","author":"Zhu Qiannan","year":"2019","unstructured":"Qiannan Zhu , Xiaofei Zhou , Jia Wu , Jianlong Tan , and Li Guo . 2019 . Neighborhood-Aware Attentional Representation for Multilingual Knowledge Graphs. In IJCAI 2019. 1943 \u20131949. Qiannan Zhu, Xiaofei Zhou, Jia Wu, Jianlong Tan, and Li Guo. 2019. Neighborhood-Aware Attentional Representation for Multilingual Knowledge Graphs. In IJCAI 2019. 1943\u20131949."},{"key":"e_1_3_2_1_106_1","volume-title":"ICLR","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann . 2019 . Adversarial Attacks on Graph Neural Networks via Meta Learning . In ICLR 2019. Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR 2019."},{"key":"e_1_3_2_1_107_1","volume-title":"Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann . 2019 . Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD 2019. 246\u2013256. Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD 2019. 246\u2013256."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403217"}],"event":{"name":"WWW '21: The Web Conference 2021","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Ljubljana Slovenia","acronym":"WWW '21"},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3449823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:22Z","timestamp":1750195462000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":107,"alternative-id":["10.1145\/3442381.3449823","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3449823","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}