{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T09:52:48Z","timestamp":1772272368813,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3542597","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:41Z","timestamp":1660331201000},"page":"4838-4839","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Trustworthy Graph Learning"],"prefix":"10.1145","author":[{"given":"Bingzhe","family":"Wu","sequence":"first","affiliation":[{"name":"Tencent AI Lab, Shenzhen, China"}]},{"given":"Yatao","family":"Bian","sequence":"additional","affiliation":[{"name":"Tencent AI Lab, Shenzhen, China"}]},{"given":"Hengtong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tencent AI Lab, Shenzhen, China"}]},{"given":"Jintang","family":"Li","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Junchi","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Liang","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Chaochao","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Junzhou","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Texas, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Survey of Adversarial Learning on Graphs. CoRR abs\/2003.05730","author":"Chen Liang","year":"2020","unstructured":"Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, and Zibin Zheng. 2020. A Survey of Adversarial Learning on Graphs. CoRR abs\/2003.05730 (2020)."},{"key":"e_1_3_2_1_2_1","volume-title":"FedGraphNN: A Federated Learning System and Benchmark for Graph Neural Networks. CoRR abs\/2104.07145","author":"He Chaoyang","year":"2021","unstructured":"Chaoyang He, Keshav Balasubramanian, Emir Ceyani, Yu Rong, Peilin Zhao, Junzhou Huang, Murali Annavaram, and Salman Avestimehr. 2021. FedGraphNN: A Federated Learning System and Benchmark for Graph Neural Networks. CoRR abs\/2104.07145 (2021)."},{"key":"e_1_3_2_1_3_1","volume-title":"A Survey of Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection. CoRR abs\/2205.10014","author":"Wu Bingzhe","year":"2022","unstructured":"Bingzhe Wu, Jintang Li, Junchi Yu, Yatao Bian, Hengtong Zhang, Chaochao Chen, Chengbin Hou, Guoji Fu, Liang Chen, Tingyang Xu, Yu Rong, Xiaolin Zheng, Junzhou Huang, Ran He, Baoyuan Wu, Guangyu Sun, Peng Cui, Zibin Zheng, Zhe Liu, and Peilin Zhao. 2022. A Survey of Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection. CoRR abs\/2205.10014 (2022)."},{"key":"e_1_3_2_1_4_1","volume-title":"Explainability in Graph Neural Networks: A Taxonomic Survey. CoRR abs\/2012.15445","author":"Yuan Hao","year":"2020","unstructured":"Hao Yuan, Haiyang Yu, Shurui Gui, and Shuiwang Ji. 2020. Explainability in Graph Neural Networks: A Taxonomic Survey. CoRR abs\/2012.15445 (2020)."}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3542597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3542597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:03:04Z","timestamp":1750186984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3542597"}},"subtitle":["Reliability, Explainability, and Privacy Protection"],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":4,"alternative-id":["10.1145\/3534678.3542597","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3542597","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}