{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:51Z","timestamp":1773511191276,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2020AAA0105200, 62102402, 91746301, U1911401"],"award-info":[{"award-number":["2020AAA0105200, 62102402, 91746301, U1911401"]}]},{"name":"Beijing Academy of Artificial Intelligence","award":["BAAI2019QN0304"],"award-info":[{"award-number":["BAAI2019QN0304"]}]},{"name":"K.C. Wong Education Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,26]]},"DOI":"10.1145\/3459637.3482393","type":"proceedings-article","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T18:33:14Z","timestamp":1635618794000},"page":"1794-1803","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Single Node Injection Attack against Graph Neural Networks"],"prefix":"10.1145","author":[{"given":"Shuchang","family":"Tao","sequence":"first","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences,University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Huawei","family":"Shen","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences,University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Junjie","family":"Huang","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences,University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yunfan","family":"Wu","sequence":"additional","affiliation":[{"name":"Data Intelligence System Research Center, Institute of Computing Technology, Chinese Academy of Sciences,University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[{"name":":CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences,University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 30nd AAAI Conference on Artificial Intelligence (AAAI '18)","author":"Baluja S."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML '19)","author":"Bojchevski Aleksandar","year":"2019"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455034"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning (ICML '20)","author":"Bojchevski Aleksandar","year":"2020"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371834"},{"key":"e_1_3_2_2_7_1","volume-title":"A Survey of Adversarial Learning on Graphs. ArXiv","author":"Chen Liang","year":"2020"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML '18)","author":"Dai Hanjun","year":"2018"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1138831.1711169"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_2_11_1","volume-title":"Single-Node Attack for Fooling Graph Neural Networks. ArXiv","author":"Finkelshtein Ben","year":"2020"},{"key":"e_1_3_2_2_12_1","volume-title":"Generating Sequences With Recurrent Neural Networks. ArXiv","author":"Graves A.","year":"2013"},{"key":"e_1_3_2_2_13_1","volume-title":"Statistical theory of extreme values and some practical applications: a series of lectures","author":"Gumbel Emil Julius"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294869"},{"key":"e_1_3_2_2_15_1","unstructured":"Weihua Hu Matthias Fey Marinka Zitnik Yuxiao Dong Hongyu Ren Bowen Liu Michele Catasta and Jure Leskovec. 2020. Open Graph Benchmark: Datasets for Machine Learning on Graphs. In Advances in Neural Information Processing Systems 33.  Weihua Hu Matthias Fey Marinka Zitnik Yuxiao Dong Hongyu Ren Bowen Liu Michele Catasta and Jure Leskovec. 2020. Open Graph Benchmark: Datasets for Machine Learning on Graphs. In Advances in Neural Information Processing Systems 33."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380029"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67664-3_24"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447556.3447566"},{"key":"e_1_3_2_2_19_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations (ICLR '17)","author":"Thomas"},{"key":"e_1_3_2_2_20_1","volume-title":"International Conference on Learning Representations (ICLR '19)","author":"Klicpera Johannes","year":"2019"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"David K\u00fcgler Alexander Distergoft Arjan Kuijper and A. Mukhopadhyay. 2018. Exploring Adversarial Examples: Patterns of One-Pixel Attacks. In MLCN\/DLF\/iMIMIC@MICCAI.  David K\u00fcgler Alexander Distergoft Arjan Kuijper and A. Mukhopadhyay. 2018. Exploring Adversarial Examples: Patterns of One-Pixel Attacks. In MLCN\/DLF\/iMIMIC@MICCAI.","DOI":"10.1007\/978-3-030-02628-8_8"},{"key":"e_1_3_2_2_22_1","volume-title":"Exploratory Adversarial Attacks on Graph Neural Networks. In 20th IEEE International Conference on Data Mining (ICDM '20)","author":"Lin Xixun","year":"2020"},{"key":"e_1_3_2_2_23_1","volume-title":"A Unified View on Graph Neural Networks as Graph Signal Denoising. ArXiv","author":"Ma Yao","year":"2020"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467416"},{"key":"e_1_3_2_2_25_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"Maaten L. V. D.","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220077"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098061"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML '19)","author":"Rieck Bastian","year":"2019"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_2_30_1","volume-title":"Adversarial Attack and Defense on Graph Data: A Survey. ArXiv","author":"Sun Lichao","year":"2018"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441782"},{"key":"e_1_3_2_2_33_1","volume-title":"Understanding the One Pixel Attack: Propagation Maps and Locality Analysis. ArXiv","author":"Vargas Danilo Vasconcellos","year":"2020"},{"key":"e_1_3_2_2_34_1","volume-title":"Graph Attention Networks. In International Conference on Learning Representations (ICLR '18)","author":"Petar Velivc","year":"2018"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_2_36_1","volume-title":"Scalable Attack on Graph Data by Injecting Vicious Nodes. ArXiv","author":"Wang Jihong","year":"2020"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403177"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3367243.3367306"},{"key":"e_1_3_2_2_39_1","volume-title":"Graph Wavelet Neural Network. In International Conference on Learning Representations (ICLR '19)","author":"Xu Bingbing","year":"2019"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"e_1_3_2_2_41_1","volume-title":"International Conference on Learning Representations (ICLR '19)","author":"Xu Keyulu"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 33nd AAAI Conference on Artificial Intelligence (AAAI '21)","author":"You Jiaxuan","year":"2021"},{"key":"e_1_3_2_2_43_1","volume-title":"GraphSAINT: Graph Sampling Based Inductive Learning Method. In International Conference on Learning Representations (ICLR '20)","author":"Zeng Hanqing","year":"2020"},{"key":"e_1_3_2_2_44_1","volume-title":"Adversarial Label-Flipping Attack and Defense for Graph Neural Networks. In 20th IEEE International Conference on Data Mining (ICDM '20)","author":"Zhang Mengmei","year":"2020"},{"key":"e_1_3_2_2_45_1","volume-title":"Proc. Representation Learning on Graphs and Manifolds Workshop, Int. Conf. Learning Representations","author":"Zhang Yingxue"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_2_47_1","volume-title":"International Conference on Learning Representations (ICLR '19)","author":"Z\u00fcgner Daniel","year":"2019"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330905"}],"event":{"name":"CIKM '21: The 30th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Queensland Australia","acronym":"CIKM '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459637.3482393","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3459637.3482393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:23Z","timestamp":1750191143000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459637.3482393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":48,"alternative-id":["10.1145\/3459637.3482393","10.1145\/3459637"],"URL":"https:\/\/doi.org\/10.1145\/3459637.3482393","relation":{},"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"2021-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}