{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:34:06Z","timestamp":1774600446299,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP220103717,DP200101374,LP170100891,LE220100078"],"award-info":[{"award-number":["DP220103717,DP200101374,LP170100891,LE220100078"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512179","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:13:07Z","timestamp":1650863587000},"page":"1322-1330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation"],"prefix":"10.1145","author":[{"given":"Sixiao","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Hongxu","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Xiangguo","family":"Sun","sequence":"additional","affiliation":[{"name":"Southeast University, China"}]},{"given":"Yicong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Machine Learning. PMLR, 695\u2013704","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In International Conference on Machine Learning. PMLR, 695\u2013704."},{"key":"e_1_3_2_1_3_1","unstructured":"Heng Chang Yu Rong Tingyang Xu Wenbing Huang Honglei Zhang Peng Cui Wenwu Zhu and Junzhou Huang. 2019. The General Black-box Attack Method for Graph Neural Networks. arXiv preprint arXiv:1908.01297(2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Feihu Che Guohua Yang Dawei Zhang Jianhua Tao Pengpeng Shao and Tong Liu. 2020. Self-supervised Graph Representation Learning via Bootstrapping. arXiv preprint arXiv:2011.05126(2020).","DOI":"10.1016\/j.neucom.2021.03.123"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00059"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219986"},{"key":"e_1_3_2_1_7_1","unstructured":"Jinyin Chen Yangyang Wu Xuanheng Xu Yixian Chen Haibin Zheng and Qi Xuan. 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797(2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"International conference on machine learning. PMLR, 1597\u20131607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597\u20131607."},{"key":"e_1_3_2_1_9_1","volume-title":"International conference on machine learning. PMLR, 1115\u20131124","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. In International conference on machine learning. PMLR, 1115\u20131124."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_2_1_12_1","unstructured":"Wei Jin Yaxin Li Han Xu Yiqi Wang and Jiliang Tang. 2020. Adversarial attacks and defenses on graphs: A review and empirical study. arXiv preprint arXiv:2003.00653(2020)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of ICLR.","author":"Kipf N","year":"2017","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In Proceedings of ICLR."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_3_2_1_16_1","unstructured":"Yao Ma Suhang Wang Tyler Derr Lingfei Wu and Jiliang Tang. 2019. Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750(2019)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403168"},{"key":"e_1_3_2_1_19_1","volume-title":"BPR: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618(2012).","author":"Rendle Steffen","year":"2012","unstructured":"Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2012. BPR: Bayesian personalized ranking from implicit feedback. arXiv preprint arXiv:1205.2618(2012)."},{"key":"e_1_3_2_1_20_1","volume-title":"The graph neural network model","author":"Scarselli Franco","year":"2008","unstructured":"Franco Scarselli, Marco Gori, Ah\u00a0Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini. 2008. The graph neural network model. IEEE transactions on neural networks 20, 1 (2008), 61\u201380."},{"key":"e_1_3_2_1_21_1","unstructured":"Yiwei Sun Suhang Wang Xianfeng Tang Tsung-Yu Hsieh and Vasant Honavar. 2019. Node injection attacks on graphs via reinforcement learning. arXiv preprint arXiv:1909.06543(2019)."},{"key":"e_1_3_2_1_22_1","unstructured":"Shantanu Thakoor Corentin Tallec Mohammad\u00a0Gheshlaghi Azar R\u00e9mi Munos Petar Veli\u010dkovi\u0107 and Michal Valko. 2021. Bootstrapped Representation Learning on Graphs. arXiv preprint arXiv:2102.06514(2021)."},{"key":"e_1_3_2_1_23_1","volume-title":"Visualizing data using t-SNE.Journal of machine learning research 9, 11","author":"Maaten Laurens Van\u00a0der","year":"2008","unstructured":"Laurens Van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE.Journal of machine learning research 9, 11 (2008)."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of ICLR.","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph attention networks. In Proceedings of ICLR."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of ICLR.","author":"Veli\u010dkovi\u0107 Petar","year":"2019","unstructured":"Petar Veli\u010dkovi\u0107, William Fedus, William\u00a0L Hamilton, Pietro Li\u00f2, Yoshua Bengio, and R\u00a0Devon Hjelm. 2019. Deep graph infomax. In Proceedings of ICLR."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_1_27_1","unstructured":"Kaidi Xu Hongge Chen Sijia Liu Pin-Yu Chen Tsui-Wei Weng Mingyi Hong and Xue Lin. 2019. Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214(2019)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Haoran Yang Hongxu Chen Lin Li Philip\u00a0S Yu and Guandong Xu. 2021. Hyper Meta-Path Contrastive Learning for Multi-Behavior Recommendation. arXiv preprint arXiv:2109.02859(2021).","DOI":"10.1109\/ICDM51629.2021.00090"},{"key":"e_1_3_2_1_29_1","volume-title":"International conference on machine learning. PMLR, 40\u201348","author":"Yang Zhilin","year":"2016","unstructured":"Zhilin Yang, William Cohen, and Ruslan Salakhudinov. 2016. Revisiting semi-supervised learning with graph embeddings. In International conference on machine learning. PMLR, 40\u201348."},{"key":"e_1_3_2_1_30_1","volume-title":"Graph contrastive learning with augmentations. Advances in Neural Information Processing Systems 33","author":"You Yuning","year":"2020","unstructured":"Yuning You, Tianlong Chen, Yongduo Sui, Ting Chen, Zhangyang Wang, and Yang Shen. 2020. Graph contrastive learning with augmentations. Advances in Neural Information Processing Systems 33 (2020)."},{"key":"e_1_3_2_1_31_1","volume-title":"Graphsaint: Graph sampling based inductive learning method. arXiv preprint arXiv:1907.04931(2019).","author":"Zeng Hanqing","year":"2019","unstructured":"Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgopal Kannan, and Viktor Prasanna. 2019. Graphsaint: Graph sampling based inductive learning method. arXiv preprint arXiv:1907.04931(2019)."},{"key":"e_1_3_2_1_32_1","unstructured":"Jiaqi Zeng and Pengtao Xie. 2020. Contrastive self-supervised learning for graph classification. arXiv preprint arXiv:2009.05923(2020)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Hengtong Zhang Tianhang Zheng Jing Gao Chenglin Miao Lu Su Yaliang Li and Kui Ren. 2019. Towards data poisoning attack against knowledge graph embedding.","DOI":"10.24963\/ijcai.2019\/674"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Sixiao Zhang Hongxu Chen Xiao Ming Lizhen Cui Hongzhi Yin and Guandong Xu. 2021. Where are we in embedding spaces? A Comprehensive Analysis on Network Embedding Approaches for Recommender Systems. arXiv preprint arXiv:2105.08908(2021).","DOI":"10.1145\/3447548.3467421"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"e_1_3_2_1_37_1","unstructured":"Yanqiao Zhu Yichen Xu Feng Yu Qiang Liu Shu Wu and Liang Wang. 2020. Deep graph contrastive representation learning. arXiv preprint arXiv:2006.04131(2020)."},{"key":"e_1_3_2_1_38_1","unstructured":"Yanqiao Zhu Yichen Xu Feng Yu Qiang Liu Shu Wu and Liang Wang. 2020. Graph Contrastive Learning with Adaptive Augmentation. arXiv preprint arXiv:2010.14945(2020)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btx252"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412(2019).","DOI":"10.24963\/ijcai.2019\/872"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","location":"Virtual Event, Lyon France","acronym":"WWW '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512179","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:14Z","timestamp":1750188674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":41,"alternative-id":["10.1145\/3485447.3512179","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512179","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}