{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:25:48Z","timestamp":1762341948299,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Luxembourg National Research Funds (FNR)","award":["C18\/IS\/12669767\/STELLAR\/LeTraon"],"award-info":[{"award-number":["C18\/IS\/12669767\/STELLAR\/LeTraon"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3522664.3528606","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T16:30:14Z","timestamp":1666024214000},"page":"77-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Influence-driven data poisoning in graph-based semi-supervised classifiers"],"prefix":"10.1145","author":[{"given":"Adriano","family":"Franci","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Luxembourg, Luxembourg"}]},{"given":"Maxime","family":"Cordy","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Luxembourg, Luxembourg"}]},{"given":"Martin","family":"Gubri","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Luxembourg, Luxembourg"}]},{"given":"Mike","family":"Papadakis","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Luxembourg, Luxembourg"}]},{"given":"Yves Le","family":"Traon","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Retrieved August 25 2020 from https:\/\/paperswithcode.com\/sota\/semi-supervised-image-classification-on-cifar-2"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Krizhevsky Alex","year":"2009","unstructured":"Alex Krizhevsky and Vinod Nair and Geoffrey Hinton. 2009. The CIFAR-10 dataset. Retrieved August 25, 2020 from https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"e_1_3_2_1_3_1","unstructured":"Shai Ben-David Tyler Lu and David Pal. 2008. Does Unlabeled Data Provably Help? Worst-case Analysis of the Sample Complexity of Semi-Supervised Learning. In COLT. 33--44."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613006"},{"key":"e_1_3_2_1_5_1","unstructured":"Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning Attacks against Support Vector Machines. arXiv:1206.6389 [cs.LG]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330580"},{"volume-title":"Advances in Neural Information Processing Systems 22","author":"Fergus Rob","key":"e_1_3_2_1_8_1","unstructured":"Rob Fergus, Yair Weiss, and Antonio Torralba. 2009. Semi-Supervised Learning in Gigantic Image Collections. In Advances in Neural Information Processing Systems 22, Y. Bengio, D. Schuurmans, J. D. Lafferty, C. K. I. Williams, and A. Culotta (Eds.). Curran Associates, Inc., 522--530. http:\/\/papers.nips.cc\/paper\/3633-semi-supervised-learning-in-gigantic-image-collections.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00521"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Wakefield Jane","year":"2016","unstructured":"Jane Wakefield. 2016. Microsoft chatbot is taught to swear on Twitter. Retrieved August 25, 2020 from https:\/\/www.bbc.com\/news\/technology-35890188"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4230\/DagMan.3.1.1"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Computational Learning Theory. Springer, 127--142","author":"Kaariainen Matti","year":"2005","unstructured":"Matti Kaariainen. 2005. Generalization error bounds using unlabeled data. In International Conference on Computational Learning Theory. Springer, 127--142."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1005332.1005345"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8452-2"},{"key":"e_1_3_2_1_17_1","volume-title":"A unified framework for data poisoning attack to graph-based semi-supervised learning. arXiv preprint arXiv:1910.14147","author":"Liu Xuanqing","year":"2019","unstructured":"Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, and Cho-Jui Hsieh. 2019. A unified framework for data poisoning attack to graph-based semi-supervised learning. arXiv preprint arXiv:1910.14147 (2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2886521.2886721"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.26"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015565"},{"key":"e_1_3_2_1_24_1","unstructured":"Matthias Seeger. 2000. Learning with Labeled and Unlabeled Data. (2000). http:\/\/infoscience.epfl.ch\/record\/161327"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2140458.2140465"},{"volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium","author":"Wang Gang","key":"e_1_3_2_1_26_1","unstructured":"Gang Wang, Tianyi Wang, Haitao Zhang, and Ben Y. Zhao. 2014. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. In Proceedings of the 23rd USENIX Conference on Security Symposium (San Diego, CA) (SEC'14). USENIX Association, USA, 239--254."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.081"},{"key":"e_1_3_2_1_28_1","volume-title":"Machine Learning Testing: Survey, Landscapes and Horizons. CoRR abs\/1906.10742","author":"Zhang Jie M.","year":"2019","unstructured":"Jie M. Zhang, Mark Harman, Lei Ma, and Yang Liu. 2019. Machine Learning Testing: Survey, Landscapes and Horizons. CoRR abs\/1906.10742 (2019). arXiv:1906.10742 http:\/\/arxiv.org\/abs\/1906.10742"},{"key":"e_1_3_2_1_29_1","volume-title":"Label Propagation Prediction of Drug-Drug Interactions Based on Clinical Side Effects. Scientific Reports 5","author":"Zhang Ping","year":"2015","unstructured":"Ping Zhang, Fei Wang, Jianying Hu, and Robert Sorrentino. 2015. Label Propagation Prediction of Drug-Drug Interactions Based on Clinical Side Effects. Scientific Reports 5 (2015)."},{"key":"e_1_3_2_1_30_1","unstructured":"Dengyong Zhou Olivier Bousquet Thomas N Lal Jason Weston and Bernhard Scholkopf. 2004. Learning with local and global consistency. In Advances in neural information processing systems. 321--328."},{"key":"e_1_3_2_1_32_1","unstructured":"Xiaojin Zhu and Youbin Ghahramani. 2002. Learning from labeled and unlabeled data with Label propagation. (2002)."},{"key":"e_1_3_2_1_33_1","volume-title":"20th International Conference on Machine Learning 3, 912--919","author":"Zhu Xiaojin","year":"2003","unstructured":"Xiaojin Zhu, Zoubin Ghahramani, and John Lafferty. 2003. Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions. ICML-03, 20th International Conference on Machine Learning 3, 912--919."}],"event":{"name":"CAIN '22: 1st Conference on AI Engineering - Software Engineering for AI","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE TCSC IEEE Technical Committee on Scalable Computing"],"location":"Pittsburgh Pennsylvania","acronym":"CAIN '22"},"container-title":["Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522664.3528606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3522664.3528606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:34Z","timestamp":1750183774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522664.3528606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":32,"alternative-id":["10.1145\/3522664.3528606","10.1145\/3522664"],"URL":"https:\/\/doi.org\/10.1145\/3522664.3528606","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}