{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:24:28Z","timestamp":1772907868770,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1633370"],"award-info":[{"award-number":["1633370"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3498497","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"675-685","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem"],"prefix":"10.1145","author":[{"given":"Jiaqi","family":"Ma","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Junwei","family":"Deng","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Qiaozhu","family":"Mei","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Adversarial attacks on node embeddings via graph poisoning. arXiv preprint arXiv:1809.01093","author":"Bojchevski Aleksandar","year":"2018","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2018. Adversarial attacks on node embeddings via graph poisoning. arXiv preprint arXiv:1809.01093 (2018)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_4_1","volume-title":"G\u00e9rard Ben Arous, and Yann LeCun","author":"Choromanska Anna","year":"2015","unstructured":"Anna Choromanska, Mikael Henaff, Michael Mathieu, G\u00e9rard Ben Arous, and Yann LeCun. 2015. The loss surfaces of multilayer networks. In Artificial intelligence and statistics . 192--204."},{"key":"e_1_3_2_2_5_1","volume-title":"Adversarial attack on graph structured data. arXiv preprint arXiv:1806.02371","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. arXiv preprint arXiv:1806.02371 (2018)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_2_8_1","volume-title":"Threshold models of collective behavior. American journal of sociology","author":"Granovetter Mark","year":"1978","unstructured":"Mark Granovetter. 1978. Threshold models of collective behavior. American journal of sociology , Vol. 83, 6 (1978), 1420--1443."},{"key":"e_1_3_2_2_9_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Advances in neural information processing systems. 1024--1034."},{"key":"e_1_3_2_2_10_1","volume-title":"Kathryn Blackmond Laskey, and Samuel Leinhardt","author":"Holland Paul W","year":"1983","unstructured":"Paul W Holland, Kathryn Blackmond Laskey, and Samuel Leinhardt. 1983. Stochastic blockmodels: First steps. Social networks , Vol. 5, 2 (1983), 109--137."},{"key":"e_1_3_2_2_11_1","unstructured":"Rishabh Iyer and Jeffrey Bilmes. 2015. Submodular point processes with applications to machine learning. In Artificial Intelligence and Statistics. 388--397."},{"key":"e_1_3_2_2_12_1","volume-title":"Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. arXiv preprint arXiv:2003.00653","author":"Jin Wei","year":"2020","unstructured":"Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, and Jiliang Tang. 2020. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. arXiv preprint arXiv:2003.00653 (2020)."},{"key":"e_1_3_2_2_13_1","unstructured":"Kenji Kawaguchi. 2016. Deep learning without poor local minima. In Advances in neural information processing systems. 586--594."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_2_15_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052643"},{"key":"e_1_3_2_2_17_1","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Li Qizhang","year":"2020","unstructured":"Qizhang Li, Yiwen Guo, and Hao Chen. 2020. Practical No-box Adversarial Attacks against DNNs. Advances in Neural Information Processing Systems , Vol. 33 (2020)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002537"},{"key":"e_1_3_2_2_19_1","volume-title":"Towards More Practical Adversarial Attacks on Graph Neural Networks. Advances in neural information processing systems","author":"Ma Jiaqi","year":"2020","unstructured":"Jiaqi Ma, Shuangrui Ding, and Qiaozhu Mei. 2020. Towards More Practical Adversarial Attacks on Graph Neural Networks. Advances in neural information processing systems (2020)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250811"},{"key":"e_1_3_2_2_21_1","volume-title":"Algorithms and Techniques (APPROX\/RANDOM 2019)","volume":"145","author":"Schoenebeck Grant","year":"2019","unstructured":"Grant Schoenebeck, Biaoshuai Tao, and Fang-Yi Yu. 2019. Think Globally, Act Locally: On the Optimal Seeding for Nonsubmodular Influence Maximization. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX\/RANDOM 2019) , Vol. 145 (2019), 39."},{"key":"e_1_3_2_2_22_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine , Vol. 29, 3 (2008), 93--93."},{"key":"e_1_3_2_2_23_1","volume-title":"Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528","author":"Sun Lichao","year":"2018","unstructured":"Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Philip S Yu, and Bo Li. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528 (2018)."},{"key":"e_1_3_2_2_24_1","volume-title":"Node injection attacks on graphs via reinforcement learning. arXiv preprint arXiv:1909.06543","author":"Sun Yiwei","year":"2019","unstructured":"Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, and Vasant Honavar. 2019. Node injection attacks on graphs via reinforcement learning. arXiv preprint arXiv:1909.06543 (2019)."},{"key":"e_1_3_2_2_25_1","volume-title":"Adversarial Attack on Hierarchical Graph Pooling Neural Networks. arXiv preprint arXiv:2005.11560","author":"Tang Haoteng","year":"2020","unstructured":"Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, and Liang Zhan. 2020. Adversarial Attack on Hierarchical Graph Pooling Neural Networks. arXiv preprint arXiv:2005.11560 (2020)."},{"key":"e_1_3_2_2_26_1","volume-title":"Graph Attention Networks. In International Conference on Learning Representations .","author":"Petar Velivc","year":"2018","unstructured":"Petar Velivc kovi\u0107 , Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In International Conference on Learning Representations ."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_2_29_1","volume-title":"Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214 (2019)."},{"key":"e_1_3_2_2_30_1","volume-title":"Representation learning on graphs with jumping knowledge networks. arXiv preprint arXiv:1806.03536","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken-ichi Kawarabayashi, and Stefanie Jegelka. 2018. Representation learning on graphs with jumping knowledge networks. arXiv preprint arXiv:1806.03536 (2018)."},{"key":"e_1_3_2_2_31_1","volume-title":"Revisiting semi-supervised learning with graph embeddings. arXiv preprint arXiv:1603.08861","author":"Yang Zhilin","year":"2016","unstructured":"Zhilin Yang, William W Cohen, and Ruslan Salakhutdinov. 2016. Revisiting semi-supervised learning with graph embeddings. arXiv preprint arXiv:1603.08861 (2016)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_2_33_1","volume-title":"Spatio-temporal graph convolutional networks: A deep learning framework for traffic forecasting. arXiv preprint arXiv:1709.04875","author":"Yu Bing","year":"2017","unstructured":"Bing Yu, Haoteng Yin, and Zhanxing Zhu. 2017. Spatio-temporal graph convolutional networks: A deep learning framework for traffic forecasting. arXiv preprint arXiv:1709.04875 (2017)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_2_35_1","volume-title":"International Conference on Learning Representations (ICLR) .","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In International Conference on Learning Representations (ICLR) ."}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","location":"Virtual Event AZ USA","acronym":"WSDM '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3488560.3498497","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3498497","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3498497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:19Z","timestamp":1750188679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":35,"alternative-id":["10.1145\/3488560.3498497","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3498497","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}