{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:35:32Z","timestamp":1769754932167,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1718216, IIS-2128019, IIS-1553568"],"award-info":[{"award-number":["IIS-1718216, IIS-2128019, IIS-1553568"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539435","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"989-998","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Graph Structural Attack by Perturbing Spectral Distance"],"prefix":"10.1145","author":[{"given":"Lu","family":"Lin","sequence":"first","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Ethan","family":"Blaser","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Hongning","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"e_1_3_2_2_2_1","volume-title":"International Conference on Machine Learning. PMLR, 695--704","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In International Conference on Machine Learning. PMLR, 695--704."},{"key":"e_1_3_2_2_3_1","volume-title":"Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp)","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). IEEE, 39--57."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482187"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"e_1_3_2_2_6_1","volume-title":"Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797","author":"Chen Jinyin","year":"2018","unstructured":"Jinyin Chen, Yangyang Wu, Xuanheng Xu, Yixian Chen, Haibin Zheng, and Qi Xuan. 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018)."},{"key":"e_1_3_2_2_7_1","unstructured":"Fan RK Chung and Fan Chung Graham. 1997. Spectral graph theory. Number 92. American Mathematical Soc."},{"key":"e_1_3_2_2_8_1","volume-title":"International conference on machine learning. PMLR, 1115--1124","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. In International conference on machine learning. PMLR, 1115--1124."},{"key":"e_1_3_2_2_9_1","volume-title":"Convolutional neural networks on graphs with fast localized spectral filtering. Advances in neural information processing systems 29","author":"Defferrard Micha\u00ebl","year":"2016","unstructured":"Micha\u00ebl Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. Advances in neural information processing systems 29 (2016), 3844--3852."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3014591"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220025"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579330"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2010.04.005"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence.","author":"Jin Ming","year":"2021","unstructured":"Ming Jin, Heng Chang, Wenwu Zhu, and Somayeh Sojoudi. 2021. Power up! robust graph convolutional network against evasion attacks based on graph powering. In Proceedings of the AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447556.3447566"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054072"},{"key":"e_1_3_2_2_17_1","volume-title":"International conference on machine learning. PMLR, 5388--5397","author":"Kenlay Henry","year":"2021","unstructured":"Henry Kenlay, Dorina Thanou, and Xiaowen Dong. 2021. Interpretable stability bounds for spectral graph filters. In International conference on machine learning. PMLR, 5388--5397."},{"key":"e_1_3_2_2_18_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations (ICLR).","author":"Thomas","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SampTA45681.2019.9030932"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3078755"},{"key":"e_1_3_2_2_21_1","volume-title":"Deeprobust: A pytorch library for adversarial attacks and defenses. arXiv preprint arXiv:2005.06149","author":"Li Yaxin","year":"2020","unstructured":"Yaxin Li, Wei Jin, Han Xu, and Jiliang Tang. 2020. Deeprobust: A pytorch library for adversarial attacks and defenses. arXiv preprint arXiv:2005.06149 (2020)."},{"key":"e_1_3_2_2_22_1","volume-title":"Towards More Practical Adversarial Attacks on Graph Neural Networks. Advances in Neural Information Processing Systems 33","author":"Ma Jiaqi","year":"2020","unstructured":"Jiaqi Ma, Shuangrui Ding, and Qiaozhu Mei. 2020. Towards More Practical Adversarial Attacks on Graph Neural Networks. Advances in Neural Information Processing Systems 33 (2020)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467416"},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Learning Representations.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_25_1","volume-title":"On differentiating eigenvalues and eigenvectors. Econometric theory 1, 2","author":"Magnus Jan R","year":"1985","unstructured":"Jan R Magnus. 1985. On differentiating eigenvalues and eigenvectors. Econometric theory 1, 2 (1985), 179--191."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009953814988"},{"key":"e_1_3_2_2_27_1","volume-title":"The Laplacian spectrum of graphs. Graph theory, combinatorics, and applications 2, 871--898","author":"Mohar Bojan","year":"1991","unstructured":"Bojan Mohar, Y Alavi, G Chartrand, and OR Oellermann. 1991. The Laplacian spectrum of graphs. Graph theory, combinatorics, and applications 2, 871--898 (1991), 12."},{"key":"e_1_3_2_2_28_1","volume-title":"The Lanczos algorithm with selective orthogonalization. Mathematics of computation 33, 145","author":"Parlett Beresford N","year":"1979","unstructured":"Beresford N Parlett and David S Scott. 1979. The Lanczos algorithm with selective orthogonalization. Mathematics of computation 33, 145 (1979), 217--238."},{"key":"e_1_3_2_2_29_1","volume-title":"International Conference on Learning Representations.","author":"Raman Mrigank","year":"2021","unstructured":"Mrigank Raman, Aaron Chan, Siddhant Agarwal, PeiFeng Wang, Hansen Wang, Sungchul Kim, Ryan Rossi, Handong Zhao, Nedim Lipka, and Xiang Ren. 2021. Learning to Deceive Knowledge Graph Augmented Models via Targeted Perturbation. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00323"},{"key":"e_1_3_2_2_31_1","volume-title":"Perturbation theory of eigenvalue problems","author":"Rellich Franz","unstructured":"Franz Rellich and Joseph Berkowitz. 1969. Perturbation theory of eigenvalue problems. CRC Press."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.2514\/3.5795"},{"key":"e_1_3_2_2_33_1","volume-title":"DropEdge: Towards Deep Graph Convolutional Networks on Node Classification. In International Conference on Learning Representations.","author":"Rong Yu","year":"2020","unstructured":"Yu Rong, Wenbing Huang, Tingyang Xu, and Junzhou Huang. 2020. DropEdge: Towards Deep Graph Convolutional Networks on Node Classification. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638850"},{"key":"e_1_3_2_2_36_1","volume-title":"Ivan Titov, and MaxWelling.","author":"Schlichtkrull Michael","year":"2018","unstructured":"Michael Schlichtkrull, Thomas N Kipf, Peter Bloem, Rianne Van Den Berg, Ivan Titov, and MaxWelling. 2018. Modeling relational data with graph convolutional networks. In European semantic web conference. Springer, 593--607."},{"key":"e_1_3_2_2_37_1","volume-title":"Collective classification in network data. AI magazine 29, 3","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine 29, 3 (2008), 93--93."},{"key":"e_1_3_2_2_38_1","first-page":"8312","article-title":"Constructing unrestricted adversarial examples with generative models","volume":"31","author":"Song Yang","year":"2018","unstructured":"Yang Song, Rui Shu, Nate Kushman, and Stefano Ermon. 2018. Constructing unrestricted adversarial examples with generative models. Advances in Neural Information Processing Systems 31 (2018), 8312--8323.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_39_1","unstructured":"Gilbert W Stewart. 1990. Matrix perturbation theory. (1990)."},{"key":"e_1_3_2_2_40_1","volume-title":"Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach","author":"Sun Yiwei","unstructured":"Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, and Vasant Honavar. 2020. Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach. Association for Computing Machinery, New York, NY, USA, 673--683."},{"key":"e_1_3_2_2_41_1","volume-title":"Graph Attention Networks. International Conference on Learning Representations","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. International Conference on Learning Representations (2018)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330956"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"e_1_3_2_2_44_1","volume-title":"Evasion Attacks to Graph Neural Networks via Influence Function. arXiv preprint arXiv:2009.00203","author":"Wang Binghui","year":"2020","unstructured":"Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, and Yiran Chen. 2020. Evasion Attacks to Graph Neural Networks via Influence Function. arXiv preprint arXiv:2009.00203 (2020)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Kilian Q Weinberger Fei Sha Qihui Zhu and Lawrence K Saul. 2007. Graph Laplacian regularization for large-scale semidefinite programming. In Advances in neural information processing systems. 1489--1496.","DOI":"10.7551\/mitpress\/7503.003.0191"},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence","author":"Tyshetskiy Yuriy","year":"2019","unstructured":"HuijunWu, ChenWang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019. Adversarial Examples for Graph Data: Deep Insights into Attack and Defense. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (Macao, China) (IJCAI'19). AAAI Press, 4816--4823."},{"key":"e_1_3_2_2_48_1","volume-title":"Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. In International Joint Conference on Artificial Intelligence (IJCAI).","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-WeiWeng, Mingyi Hong, and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. In International Joint Conference on Artificial Intelligence (IJCAI)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_2_50_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In International Conference on Learning Representations (ICLR)."}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539435","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539435","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:03:03Z","timestamp":1750186983000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539435"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":50,"alternative-id":["10.1145\/3534678.3539435","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539435","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}