{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:40:31Z","timestamp":1769737231274,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"DDAI COMET Module"},{"name":"TRUSTS","award":["871481"],"award-info":[{"award-number":["871481"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,25]]},"DOI":"10.1145\/3465336.3475110","type":"proceedings-article","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T21:11:41Z","timestamp":1629925901000},"page":"111-120","source":"Crossref","is-referenced-by-count":14,"title":["Structack: Structure-based Adversarial Attacks on Graph Neural Networks"],"prefix":"10.1145","author":[{"given":"Hussain","family":"Hussain","sequence":"first","affiliation":[{"name":"Graz University of Technology &amp; Know Center GmbH, Graz, Austria"}]},{"given":"Tomislav","family":"Duricic","sequence":"additional","affiliation":[{"name":"Graz University of Technology &amp; Know Center GmbH, Graz, Austria"}]},{"given":"Elisabeth","family":"Lex","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Denis","family":"Helic","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Markus","family":"Strohmaier","sequence":"additional","affiliation":[{"name":"RWTH Aachen &amp; GESIS - Leibniz Institute for the Social Sciences, Aachen, Germany"}]},{"given":"Roman","family":"Kern","sequence":"additional","affiliation":[{"name":"Graz University of Technology &amp; Know Center GmbH, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,8,29]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 3rd International Workshop on Link Discovery","author":"Lada"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Sadegh Aliakbary Jafar Habibi and Ali Movaghar. 2014. Quantification and comparison of degree distributions in complex networks. In 7'th International Symposium on Telecommunications (IST'2014). 464--469. https:\/\/doi.org\/10.1109\/ISTEL.2014.7000748  Sadegh Aliakbary Jafar Habibi and Ali Movaghar. 2014. Quantification and comparison of degree distributions in complex networks. In 7'th International Symposium on Telecommunications (IST'2014). 464--469. https:\/\/doi.org\/10.1109\/ISTEL.2014.7000748","DOI":"10.1109\/ISTEL.2014.7000748"},{"key":"e_1_3_2_2_3_1","volume-title":"Community detection in networks using graph distance. arXiv preprint arXiv:1401.3915","author":"Bhattacharyya Sharmodeep","year":"2014"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"e_1_3_2_2_6_1","volume-title":"Adversarial attack on graph structured data. arXiv preprint arXiv:1806.02371","author":"Dai Hanjun","year":"2018"},{"key":"e_1_3_2_2_7_1","volume-title":"Centrality in social networks conceptual clarification. Social networks","author":"Freeman Linton C","year":"1978"},{"key":"e_1_3_2_2_8_1","volume-title":"AAAI workshop","author":"Geisler Simon","year":"2021"},{"key":"e_1_3_2_2_9_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Advances in Neural Information Processing Systems. 1024--1034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Advances in Neural Information Processing Systems. 1024--1034."},{"key":"e_1_3_2_2_10_1","volume-title":"On the Impact of Communities on Semi-supervised Classification Using Graph Neural Networks. In International Conference on Complex Networks and Their Applications. Springer, 15--26","author":"Hussain Hussain","year":"2020"},{"key":"e_1_3_2_2_11_1","volume-title":"2020 a. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. arXiv preprint arXiv:2003.00653","author":"Jin Wei","year":"2020"},{"key":"e_1_3_2_2_12_1","volume-title":"2020 b. Graph Structure Learning for Robust Graph Neural Networks","author":"Jin Wei"},{"key":"e_1_3_2_2_13_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations (ICLR).","author":"Thomas"},{"key":"e_1_3_2_2_14_1","volume-title":"32nd AAAI Conference on Artificial Intelligence, AAAI 2018","author":"Li Qimai","year":"2018"},{"key":"e_1_3_2_2_15_1","volume-title":"Controllability of complex networks. nature","author":"Liu Yang-Yu","year":"2011"},{"key":"e_1_3_2_2_16_1","volume-title":"Black-Box Adversarial Attacks on Graph Neural Networks with Limited Node Access. arXiv preprint arXiv:2006.05057","author":"Ma Jiaqi","year":"2020"},{"key":"e_1_3_2_2_17_1","volume-title":"Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750","author":"Ma Yao","year":"2019"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009953814988"},{"key":"e_1_3_2_2_19_1","volume-title":"10th International Workshop on Mining and Learning with Graphs","volume":"8","author":"Namata Galileo","year":"2012"},{"key":"e_1_3_2_2_20_1","volume-title":"Networks","author":"Newman Mark"},{"key":"e_1_3_2_2_21_1","volume-title":"The mathematics of networks. The new palgrave encyclopedia of economics","author":"Newman Mark EJ","year":"2008"},{"key":"e_1_3_2_2_23_1","volume-title":"The Effects of Randomness on the Stability of Node Embeddings. arXiv preprint arXiv:2005.10039","author":"Schumacher Tobias","year":"2020"},{"key":"e_1_3_2_2_24_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008"},{"key":"e_1_3_2_2_25_1","volume-title":"Pitfalls of Graph Neural Network Evaluation. Relational Representation Learning Workshop, NeurIPS 2018","author":"Shchur Oleksandr","year":"2018"},{"key":"e_1_3_2_2_26_1","volume-title":"Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach","author":"Sun Yiwei"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of Machine Learning Research","author":"Wu Felix","year":"2019"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence. AAAI Press, 4816--4823","author":"Wu Huijun","year":"2019"},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19","author":"Xu Kaidi","year":"2019"},{"key":"e_1_3_2_2_31_1","unstructured":"Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks. In Advances in Neural Information Processing Systems. 5165--5175.  Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks. In Advances in Neural Information Processing Systems. 5165--5175."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_2_34_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=Bylnx209YX","author":"Z\u00fcgner Daniel","year":"2019"}],"event":{"name":"HT '21: 32nd ACM Conference on Hypertext and Social Media","location":"Virtual Event USA","acronym":"HT '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 32st ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:12Z","timestamp":1750191432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,25]]},"references-count":33,"alternative-id":["10.1145\/3465336.3475110","10.1145\/3465336"],"URL":"https:\/\/doi.org\/10.1145\/3465336.3475110","relation":{},"subject":[],"published":{"date-parts":[[2021,8,25]]}}}