{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T05:42:31Z","timestamp":1770529351526,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2045, 62192784, 62172052, 62002029, U1936104"],"award-info":[{"award-number":["U20B2045, 62192784, 62172052, 62002029, U1936104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583509","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"630-640","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Minimum Topology Attacks for Graph Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4581-0977","authenticated-orcid":false,"given":"Mengmei","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4444-7811","authenticated-orcid":false,"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3734-0266","authenticated-orcid":false,"given":"Chuan","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3170-4994","authenticated-orcid":false,"given":"Lingjuan","family":"Lyu","sequence":"additional","affiliation":[{"name":"Sony AI, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1215-8676","authenticated-orcid":false,"given":"Tianchi","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9402-3806","authenticated-orcid":false,"given":"Junping","family":"Du","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 3rd international workshop on Link discovery, LinkKDD 2005","author":"A.","year":"2005","unstructured":"Lada\u00a0A. Adamic and Natalie\u00a0S. Glance. 2005. The political blogosphere and the 2004 U.S. election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery, LinkKDD 2005, Chicago, Illinois, USA, August 21-25, 2005. ACM, 36\u201343."},{"key":"e_1_3_2_1_2_1","volume-title":"Metrics and Applications. ArXiv abs\/1910.13427","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, \u00dalfar Erlingsson, and Nicolas Papernot. 2019. Distribution Density, Tails, and Outliers in Machine Learning: Metrics and Applications. ArXiv abs\/1910.13427 (2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. 2017 IEEE Symposium on Security and Privacy (SP)","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David\u00a0A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. 2017 IEEE Symposium on Security and Privacy (SP) (2017), 39\u201357."},{"key":"e_1_3_2_1_4_1","unstructured":"Heng Chang Yu Rong Tingyang Xu Yatao Bian Shi-Yao Zhou Xin Wang Junzhou Huang and Wenwu Zhu. 2021. Not All Low-Pass Filters are Robust in Graph Convolutional Networks. In NeurIPS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Heng Chang Yu Rong Tingyang Xu Wenbing Huang Honglei Zhang Peng Cui Wenwu Zhu and Junzhou Huang. 2020. A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models. AAAI.","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Liang Chen Jintang Li Qibiao Peng Yang Liu Zibin Zheng and Carl Yang. 2021. Understanding Structural Vulnerability in Graph Convolutional Networks. In IJCAI.","DOI":"10.24963\/ijcai.2021\/310"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial Attack on Graph Structured Data. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018(Proceedings of Machine Learning Research, Vol.\u00a080). PMLR, 1123\u20131132."},{"key":"e_1_3_2_1_8_1","volume-title":"Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers. ArXiv abs\/2009.10233","author":"Feng Boyuan","year":"2020","unstructured":"Boyuan Feng, Yuke Wang, Xu Li, and Yufei Ding. 2020. Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers. ArXiv abs\/2009.10233 (2020)."},{"key":"e_1_3_2_1_9_1","first-page":"7637","article-title":"Robustness of graph neural networks at scale","volume":"34","author":"Geisler Simon","year":"2021","unstructured":"Simon Geisler, Tobias Schmidt, Hakan \u015eirin, Daniel Z\u00fcgner, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2021. Robustness of graph neural networks at scale. Advances in Neural Information Processing Systems 34 (2021), 7637\u20137649.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_10_1","volume-title":"Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572","author":"Goodfellow J.","year":"2015","unstructured":"Ian\u00a0J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572 (2015)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465336.3475110"},{"key":"e_1_3_2_1_12_1","volume-title":"Kipf and Max Welling","author":"N.","year":"2017","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings."},{"key":"e_1_3_2_1_13_1","unstructured":"Johannes Klicpera Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Predict then Propagate: Graph Neural Networks meet Personalized PageRank. In ICLR."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539484"},{"key":"e_1_3_2_1_15_1","volume-title":"AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks","author":"Liu Ao","year":"2022","unstructured":"Ao Liu, Beibei Li, Tao Li, Pan Zhou, and Rui Wang. 2022. AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks.IEEE transactions on neural networks and learning systems PP (2022)."},{"key":"e_1_3_2_1_16_1","volume-title":"MGNNI: Multiscale Graph Neural Networks with Implicit Layers. In NeurIPS.","author":"Liu Juncheng","year":"2023","unstructured":"Juncheng Liu, Bryan Hooi, Kenji Kawaguchi, and X. Xiao. 2023. MGNNI: Multiscale Graph Neural Networks with Implicit Layers. In NeurIPS."},{"key":"e_1_3_2_1_17_1","volume-title":"EIGNN: Efficient Infinite-Depth Graph Neural Networks. In NeurIPS. 18762\u201318773.","author":"Liu Juncheng","year":"2021","unstructured":"Juncheng Liu, Kenji Kawaguchi, Bryan Hooi, Yiwei Wang, and Xiaokui Xiao. 2021. EIGNN: Efficient Infinite-Depth Graph Neural Networks. In NeurIPS. 18762\u201318773."},{"key":"e_1_3_2_1_18_1","unstructured":"Xiaorui Liu Jiayuan Ding Wei Jin Han Xu Yao Ma Zitao Liu and Jiliang Tang. 2021. Graph Neural Networks with Adaptive Residual. In NeurIPS."},{"key":"e_1_3_2_1_19_1","unstructured":"Xiaorui Liu Wei Jin Yao Ma Yaxin Li Hua Liu Yiqi Wang Ming Yan and Jiliang Tang. 2021. Elastic Graph Neural Networks. In ICML."},{"key":"e_1_3_2_1_20_1","unstructured":"Xuanqing Liu Si Si Xiaojin Zhu Yang Li and Cho-Jui Hsieh. 2019. A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning. In NeurIPS."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498481"},{"key":"e_1_3_2_1_22_1","volume-title":"Attacking Graph Convolutional Networks via Rewiring. CoRR abs\/1906.03750","author":"Ma Yao","year":"2019","unstructured":"Yao Ma, Suhang Wang, Lingfei Wu, and Jiliang Tang. 2019. Attacking Graph Convolutional Networks via Rewiring. CoRR abs\/1906.03750 (2019)."},{"key":"e_1_3_2_1_23_1","volume-title":"Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints. ArXiv abs\/2102.12827","author":"Pintor Maura","year":"2021","unstructured":"Maura Pintor, Fabio Roli, Wieland Brendel, and Battista Biggio. 2021. Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints. ArXiv abs\/2102.12827 (2021)."},{"key":"e_1_3_2_1_24_1","unstructured":"Yao Qin Xuezhi Wang Alex Beutel and Ed\u00a0H. Chi. 2020. Improving Calibration through the Relationship with Adversarial Robustness."},{"key":"e_1_3_2_1_25_1","volume-title":"Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses. CVPR","author":"Rony J\u00e9r\u00f4me","year":"2019","unstructured":"J\u00e9r\u00f4me Rony, Luiz\u00a0G. Hafemann, Luiz Oliveira, Ismail\u00a0Ben Ayed, Robert Sabourin, and Eric Granger. 2019. Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses. CVPR (2019), 4317\u20134325."},{"key":"e_1_3_2_1_26_1","volume-title":"Curls & Whey: Boosting Black-Box Adversarial Attacks. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Shi Yucheng","year":"2019","unstructured":"Yucheng Shi, Siyu Wang, and Yahong Han. 2019. Curls & Whey: Boosting Black-Box Adversarial Attacks. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019), 6512\u20136520."},{"key":"e_1_3_2_1_27_1","volume-title":"Data Poisoning Attack against Unsupervised Node Embedding Methods. ArXiv abs\/1810.12881","author":"Sun Mingjie","year":"2018","unstructured":"Mingjie Sun, Jian Tang, Huichen Li, Bo Li, Chaowei Xiao, Yao Chen, and Dawn\u00a0Xiaodong Song. 2018. Data Poisoning Attack against Unsupervised Node Embedding Methods. ArXiv abs\/1810.12881 (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01302"},{"key":"e_1_3_2_1_29_1","volume-title":"ArXiv abs\/2109.14285","author":"Wang Xiao","year":"2021","unstructured":"Xiao Wang, Hongrui Liu, Chuan Shi, and Cheng Yang. 2021. Be Confident! Towards Trustworthy Graph Neural Networks via Confidence Calibration. ArXiv abs\/2109.14285 (2021)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Yiwei Wang Shenghua Liu Minji Yoon Hemank Lamba Wei Wang Christos Faloutsos and Bryan Hooi. 2020. Provably Robust Node Classification via Low-Pass Message Passing. In ICDM. 621\u2013630.","DOI":"10.1109\/ICDM50108.2020.00071"},{"key":"e_1_3_2_1_31_1","volume-title":"Cluster Attack: Query-based Adversarial Attacks on Graph with Graph-Dependent Priors. In IJCAI.","author":"Wang Zhengyi","year":"2022","unstructured":"Zhengyi Wang, Zhongkai Hao, Ziqiao Wang, Hang Su, and Jun Zhu. 2022. Cluster Attack: Query-based Adversarial Attacks on Graph with Graph-Dependent Priors. In IJCAI."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_1_33_1","volume-title":"Simplifying Graph Convolutional Networks. ArXiv abs\/1902.07153","author":"Wu Felix","year":"2019","unstructured":"Felix Wu, Tianyi Zhang, Amauri\u00a0H. de Souza, Christopher Fifty, Tao Yu, and Kilian\u00a0Q. Weinberger. 2019. Simplifying Graph Convolutional Networks. ArXiv abs\/1902.07153 (2019)."},{"key":"e_1_3_2_1_34_1","unstructured":"Huijun Wu Chen Wang Yu.\u00a0O. Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019. Adversarial Examples for Graph Data: Deep Insights into Attack and Defense. In IJCAI."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482299"},{"key":"e_1_3_2_1_36_1","volume-title":"Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. ArXiv abs\/1906.04214","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. ArXiv abs\/1906.04214 (2019)."},{"key":"e_1_3_2_1_37_1","volume-title":"Derivative-free optimization adversarial attacks for graph convolutional networks. PeerJ Computer Science 7","author":"Yang Runze","year":"2021","unstructured":"Runze Yang and Teng Long. 2021. Derivative-free optimization adversarial attacks for graph convolutional networks. PeerJ Computer Science 7 (2021)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06863-1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482161"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512179"},{"key":"e_1_3_2_1_41_1","volume-title":"Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning. ArXiv abs\/2111.04314","author":"Zheng Qinkai","year":"2021","unstructured":"Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, and Jie Tang. 2021. Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning. ArXiv abs\/2111.04314 (2021)."},{"key":"e_1_3_2_1_42_1","volume-title":"Graph Neural Networks: A Review of Methods and Applications. ArXiv abs\/1812.08434","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou, Ganqu Cui, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, and Maosong Sun. 2020. Graph Neural Networks: A Review of Methods and Applications. ArXiv abs\/1812.08434 (2020)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Jun Zhuang and Mohammad al Hasan. 2022. Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-supervision. In AAAI.","DOI":"10.1609\/aaai.v36i4.20362"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial Attacks on Neural Networks for Graph Data. In KDD. 2847\u20132856.","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_46_1","volume-title":"7th International Conference on Learning Representations, ICLR 2019","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:02Z","timestamp":1750178822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":46,"alternative-id":["10.1145\/3543507.3583509","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583509","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}