{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:32:28Z","timestamp":1752669148585,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M713206"],"award-info":[{"award-number":["2022M713206"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program Young Scientists Project","award":["2022YFB3102200"],"award-info":[{"award-number":["2022YFB3102200"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2046"],"award-info":[{"award-number":["U21B2046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3615084","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:26Z","timestamp":1697874326000},"page":"2208-2218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["TOAK: A Topology-oriented Attack Strategy for Degrading User Identity Linkage in Cross-network Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1552-4769","authenticated-orcid":false,"given":"Jiangli","family":"Shao","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9050-9705","authenticated-orcid":false,"given":"Yongqing","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2401-6499","authenticated-orcid":false,"given":"Fangda","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4908-3444","authenticated-orcid":false,"given":"Boshen","family":"Shi","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1081-8119","authenticated-orcid":false,"given":"Huawei","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5201-8195","authenticated-orcid":false,"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In ICML. PMLR 695--704.  Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In ICML. PMLR 695--704."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.02.023"},{"key":"e_1_3_2_1_3_1","volume-title":"ECAI","volume":"325","author":"Chen Siyuan","year":"2020","unstructured":"Siyuan Chen , Jiahai Wang , Xin Du , and Yanqing Hu . 2020 . A Novel Framework with Information Fusion and Neighborhood Enhancement for User Identity Linkage . In ECAI 2020, Vol. 325 . IOS Press, 1754--1761. Siyuan Chen, Jiahai Wang, Xin Du, and Yanqing Hu. 2020. A Novel Framework with Information Fusion and Neighborhood Enhancement for User Identity Linkage. In ECAI 2020, Vol. 325. IOS Press, 1754--1761."},{"key":"e_1_3_2_1_4_1","volume-title":"Adversarial-Enhanced Hybrid Graph Network for User Identity Linkage. In SIGIR '21","author":"Chen Xiaolin","year":"2021","unstructured":"Xiaolin Chen , Xuemeng Song , Guozhen Peng , Shanshan Feng , and Liqiang Nie . 2021 . Adversarial-Enhanced Hybrid Graph Network for User Identity Linkage. In SIGIR '21 . ACM, 1084--1093. Xiaolin Chen, Xuemeng Song, Guozhen Peng, Shanshan Feng, and Liqiang Nie. 2021. Adversarial-Enhanced Hybrid Graph Network for User Identity Linkage. In SIGIR '21. ACM, 1084--1093."},{"key":"e_1_3_2_1_5_1","volume-title":"Cross-Network Embedding for Multi-Network Alignment. In The ACM Web Conference.","author":"Chu Xiaokai","year":"2019","unstructured":"Xiaokai Chu , Xinxin Fan , Di Yao , Zhihua Zhu , Jianhui Huang , and Jingping Bi . 2019 . Cross-Network Embedding for Multi-Network Alignment. In The ACM Web Conference. Xiaokai Chu, Xinxin Fan, Di Yao, Zhihua Zhu, Jianhui Huang, and Jingping Bi. 2019. Cross-Network Embedding for Multi-Network Alignment. In The ACM Web Conference."},{"key":"e_1_3_2_1_6_1","volume-title":"Variational Cross-Network Embedding for Anonymized User Identity Linkage. In ACM International Conference on Information and Knowledge Management.","author":"Chu Xiaokai","year":"2021","unstructured":"Xiaokai Chu , Xinxin Fan , Zhihua Zhu , and Jingping Bi . 2021 . Variational Cross-Network Embedding for Anonymized User Identity Linkage. In ACM International Conference on Information and Knowledge Management. Xiaokai Chu, Xinxin Fan, Zhihua Zhu, and Jingping Bi. 2021. Variational Cross-Network Embedding for Anonymized User Identity Linkage. In ACM International Conference on Information and Knowledge Management."},{"key":"e_1_3_2_1_7_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. In ICML. PMLR 1115--1124.  Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. In ICML. PMLR 1115--1124."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.5.011027"},{"key":"e_1_3_2_1_9_1","volume-title":"Manipulating node similarity measures in networks. arXiv preprint arXiv:1910.11529","author":"Dey Palash","year":"2019","unstructured":"Palash Dey and Sourav Medya . 2019. Manipulating node similarity measures in networks. arXiv preprint arXiv:1910.11529 ( 2019 ). Palash Dey and Sourav Medya. 2019. Manipulating node similarity measures in networks. arXiv preprint arXiv:1910.11529 (2019)."},{"volume-title":"Link prediction and recommendation across heterogeneous social networks","author":"Dong Yuxiao","key":"e_1_3_2_1_10_1","unstructured":"Yuxiao Dong , Jie Tang , Sen Wu , Jilei Tian , Nitesh V Chawla , Jinghai Rao , and Huanhuan Cao . 2012. Link prediction and recommendation across heterogeneous social networks . In ICDM. IEEE , 181--190. Yuxiao Dong, Jie Tang, Sen Wu, Jilei Tian, Nitesh V Chawla, Jinghai Rao, and Huanhuan Cao. 2012. Link prediction and recommendation across heterogeneous social networks. In ICDM. IEEE, 181--190."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/312"},{"key":"e_1_3_2_1_12_1","volume-title":"Papalexakis","author":"Entezari Negin","year":"2020","unstructured":"Negin Entezari , Saba A. Al-Sayouri , Amirali Darvishzadeh , and Evangelos E . Papalexakis . 2020 . All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs. In WSDM '20. Negin Entezari, Saba A. Al-Sayouri, Amirali Darvishzadeh, and Evangelos E. Papalexakis. 2020. All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs. In WSDM '20."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330673"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313424"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Aasa Feragen Francois Lauze and Soren Hauberg. 2015. Geodesic exponential kernels: When curvature and linearity conflict. In CVPR. 3032--3042.  Aasa Feragen Francois Lauze and Soren Hauberg. 2015. Geodesic exponential kernels: When curvature and linearity conflict. In CVPR. 3032--3042.","DOI":"10.1109\/CVPR.2015.7298922"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep Graph Matching Consensus. In ICLR","author":"Fey Matthias","year":"2020","unstructured":"Matthias Fey , Jan Eric Lenssen , Christopher Morris , Jonathan Masci , and Nils M. Kriege . 2020 . Deep Graph Matching Consensus. In ICLR 2020 . Matthias Fey, Jan Eric Lenssen, Christopher Morris, Jonathan Masci, and Nils M. Kriege. 2020. Deep Graph Matching Consensus. In ICLR 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271788"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.026107"},{"key":"e_1_3_2_1_20_1","volume-title":"Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE","author":"Huynh Thanh Trung","year":"2020","unstructured":"Thanh Trung Huynh , Van Vinh Tong , Thanh Tam Nguyen , Hongzhi Yin , Matthias Weidlich , and Nguyen Quoc Viet Hung . 2020 . Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE 2020. Thanh Trung Huynh, Van Vinh Tong, Thanh Tam Nguyen, Hongzhi Yin, Matthias Weidlich, and Nguyen Quoc Viet Hung. 2020. Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE 2020."},{"key":"e_1_3_2_1_21_1","volume-title":"Variational graph auto-encoders. arXiv preprint arXiv:1611.07308","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling . 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 ( 2016 ). Thomas N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016)."},{"key":"e_1_3_2_1_22_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In ICLR","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017 . Semi-Supervised Classification with Graph Convolutional Networks. In ICLR 2017 . Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR 2017."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505531"},{"key":"e_1_3_2_1_24_1","volume-title":"Big-align: Fast bipartite graph alignment","author":"Koutra Danai","year":"2013","unstructured":"Danai Koutra , Hanghang Tong , and David Lubensky . 2013 . Big-align: Fast bipartite graph alignment . In ICDM. IEEE , 389--398. Danai Koutra, Hanghang Tong, and David Lubensky. 2013. Big-align: Fast bipartite graph alignment. In ICDM. IEEE, 389--398."},{"key":"e_1_3_2_1_25_1","volume-title":"Adversarial Learning for Weakly-Supervised Social Network Alignment. In The AAAI Conference on Artificial Intelligence. AAAI Press, 996--1003","author":"Li Chaozhuo","year":"2019","unstructured":"Chaozhuo Li , Senzhang Wang , Yukun Wang , Philip S. Yu , Yanbo Liang , Yun Liu , and Zhoujun Li . 2019 . Adversarial Learning for Weakly-Supervised Social Network Alignment. In The AAAI Conference on Artificial Intelligence. AAAI Press, 996--1003 . Chaozhuo Li, Senzhang Wang, Yukun Wang, Philip S. Yu, Yanbo Liang, Yun Liu, and Zhoujun Li. 2019. Adversarial Learning for Weakly-Supervised Social Network Alignment. In The AAAI Conference on Artificial Intelligence. AAAI Press, 996--1003."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5345"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539435"},{"key":"e_1_3_2_1_28_1","unstructured":"Li Liu William K Cheung Xin Li and Lejian Liao. 2016. Aligning Users across Social Networks Using Network Embedding.. In Ijcai. 1774--1780.  Li Liu William K Cheung Xin Li and Lejian Liao. 2016. Aligning Users across Social Networks Using Network Embedding.. In Ijcai. 1774--1780."},{"key":"e_1_3_2_1_29_1","unstructured":"Tong Man Huawei Shen Shenghua Liu Xiaolong Jin and Xueqi Cheng. 2016. Predict anchor links across social networks via an embedding approach.. In Ijcai.  Tong Man Huawei Shen Shenghua Liu Xiaolong Jin and Xueqi Cheng. 2016. Predict anchor links across social networks via an embedding approach.. In Ijcai."},{"key":"e_1_3_2_1_30_1","volume-title":"L-opacity: Linkage-Aware Graph Anonymization. In EDBT. 583--594.","author":"Nobari Sadegh","year":"2014","unstructured":"Sadegh Nobari , Panagiotis Karras , HweeHwa Pang , and St\u00e9 phane Bressan . 2014 . L-opacity: Linkage-Aware Graph Anonymization. In EDBT. 583--594. Sadegh Nobari, Panagiotis Karras, HweeHwa Pang, and St\u00e9 phane Bressan. 2014. L-opacity: Linkage-Aware Graph Anonymization. In EDBT. 583--594."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21650"},{"key":"e_1_3_2_1_33_1","volume-title":"Graph Alignment with Noisy Supervision. In The ACM Web Conference. ACM, 1104--1114","author":"Pei Shichao","year":"2022","unstructured":"Shichao Pei , Lu Yu , Guoxian Yu , and Xiangliang Zhang . 2022 . Graph Alignment with Noisy Supervision. In The ACM Web Conference. ACM, 1104--1114 . Shichao Pei, Lu Yu, Guoxian Yu, and Xiangliang Zhang. 2022. Graph Alignment with Noisy Supervision. In The ACM Web Conference. ACM, 1104--1114."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Aria Rezaei and Jie Gao. 2019. On Privacy of Socially Contagious Attributes. In ICDM. 1294--1299.  Aria Rezaei and Jie Gao. 2019. On Privacy of Socially Contagious Attributes. In ICDM. 1294--1299.","DOI":"10.1109\/ICDM.2019.00163"},{"key":"e_1_3_2_1_35_1","volume-title":"Carlo Tomasi, and Leonidas J Guibas","author":"Rubner Yossi","year":"2000","unstructured":"Yossi Rubner , Carlo Tomasi, and Leonidas J Guibas . 2000 . The earth mover's distance as a metric for image retrieval. International journal of computer vision, Vol. 40 , 2 (2000), 99--121. Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. 2000. The earth mover's distance as a metric for image retrieval. International journal of computer vision, Vol. 40, 2 (2000), 99--121."},{"key":"e_1_3_2_1_36_1","volume-title":"The kernel trick for distances. Advances in neural information processing systems","author":"Sch\u00f6lkopf Bernhard","year":"2000","unstructured":"Bernhard Sch\u00f6lkopf . 2000. The kernel trick for distances. Advances in neural information processing systems , Vol. 13 ( 2000 ). Bernhard Sch\u00f6lkopf. 2000. The kernel trick for distances. Advances in neural information processing systems, Vol. 13 (2000)."},{"key":"e_1_3_2_1_37_1","volume-title":"PAAE: A Unified Framework for Predicting Anchor Links with Adversarial Embedding. In ICME","author":"Shang Yanmin","year":"2019","unstructured":"Yanmin Shang , Zhezhou Kang , Yanan Cao , Dongjie Zhang , Yang Li , Yangxi Li , and Yanbing Liu . 2019 . PAAE: A Unified Framework for Predicting Anchor Links with Adversarial Embedding. In ICME 2019. IEEE, 682--687. Yanmin Shang, Zhezhou Kang, Yanan Cao, Dongjie Zhang, Yang Li, Yangxi Li, and Yanbing Liu. 2019. PAAE: A Unified Framework for Predicting Anchor Links with Adversarial Embedding. In ICME 2019. IEEE, 682--687."},{"key":"e_1_3_2_1_38_1","volume-title":"Temporal Convolutional Networks for Popularity Prediction of Messages on Social Medias. In CCIR 2019 (Lecture Notes in Computer Science","volume":"147","author":"Shao Jiangli","year":"2019","unstructured":"Jiangli Shao , Huawei Shen , Qi Cao , and Xueqi Cheng . 2019 . Temporal Convolutional Networks for Popularity Prediction of Messages on Social Medias. In CCIR 2019 (Lecture Notes in Computer Science , Vol. 11772). Springer, 135-- 147 . Jiangli Shao, Huawei Shen, Qi Cao, and Xueqi Cheng. 2019. Temporal Convolutional Networks for Popularity Prediction of Messages on Social Medias. In CCIR 2019 (Lecture Notes in Computer Science, Vol. 11772). Springer, 135--147."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482134"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.10.027"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068777.3068781"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0806627105"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2008.4696654"},{"key":"e_1_3_2_1_44_1","volume-title":"Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528","author":"Sun Lichao","year":"2018","unstructured":"Lichao Sun , Yingtong Dou , Carl Yang , Ji Wang , Philip S Yu , Lifang He , and Bo Li. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528 ( 2018 ). Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Philip S Yu, Lifang He, and Bo Li. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528 (2018)."},{"key":"e_1_3_2_1_45_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Togninalli Matteo","year":"2019","unstructured":"Matteo Togninalli , Elisabetta Ghisu , Felipe Llinares-L\u00f3pez , Bastian Rieck , and Karsten Borgwardt . 2019 . Wasserstein weisfeiler-lehman graph kernels . Advances in Neural Information Processing Systems , Vol. 32 (2019). Matteo Togninalli, Elisabetta Ghisu, Felipe Llinares-L\u00f3pez, Bastian Rieck, and Karsten Borgwardt. 2019. Wasserstein weisfeiler-lehman graph kernels. Advances in Neural Information Processing Systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112883"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0572-3"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313430"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_50_1","unstructured":"Zhaohan Xi Ren Pang Shouling Ji and Ting Wang. 2021. Graph backdoor. In USENIX Security 21. 1523--1540.  Zhaohan Xi Ren Pang Shouling Ji and Ting Wang. 2021. Graph backdoor. In USENIX Security 21. 1523--1540."},{"key":"e_1_3_2_1_51_1","volume-title":"NeurIPS","author":"Xu Hongteng","year":"2019","unstructured":"Hongteng Xu , Dixin Luo , and Lawrence Carin . 2019. Scalable Gromov-Wasserstein Learning for Graph Partitioning and Matching . In NeurIPS 2019 . Hongteng Xu, Dixin Luo, and Lawrence Carin. 2019. Scalable Gromov-Wasserstein Learning for Graph Partitioning and Matching. In NeurIPS 2019."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450053"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783417"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0441-5"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Jiawei Zhang Xiangnan Kong and Philip S Yu. 2014. Transferring heterogeneous links across location-based social networks. In WSDM. 303--312.  Jiawei Zhang Xiangnan Kong and Philip S Yu. 2014. Transferring heterogeneous links across location-based social networks. In WSDM. 303--312.","DOI":"10.1145\/2556195.2559894"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Sen Zhang Weiwei Ni and Nan Fu. 2020a. Community Preserved Social Graph Publishing with Node Differential Privacy. In ICDM. 1400--1405.  Sen Zhang Weiwei Ni and Nan Fu. 2020a. Community Preserved Social Graph Publishing with Node Differential Privacy. In ICDM. 1400--1405.","DOI":"10.1109\/ICDM50108.2020.00184"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939766"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467331"},{"key":"e_1_3_2_1_59_1","first-page":"20834","article-title":"Adversarial attacks on deep graph matching","volume":"33","author":"Zhang Zijie","year":"2020","unstructured":"Zijie Zhang , Zeru Zhang , Yang Zhou , Yelong Shen , Ruoming Jin , and Dejing Dou . 2020 b. Adversarial attacks on deep graph matching . Advances in Neural Information Processing Systems , Vol. 33 (2020), 20834 -- 20851 . Zijie Zhang, Zeru Zhang, Yang Zhou, Yelong Shen, Ruoming Jin, and Dejing Dou. 2020b. Adversarial attacks on deep graph matching. Advances in Neural Information Processing Systems, Vol. 33 (2020), 20834--20851.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_60_1","volume-title":"CoLink: An Unsupervised Framework for User Identity Linkage. In The AAAI Conference on Artificial Intelligence. AAAI Press, 5714--5721","author":"Zhong Zexuan","year":"2018","unstructured":"Zexuan Zhong , Yong Cao , Mu Guo , and Zaiqing Nie . 2018 . CoLink: An Unsupervised Framework for User Identity Linkage. In The AAAI Conference on Artificial Intelligence. AAAI Press, 5714--5721 . Zexuan Zhong, Yong Cao, Mu Guo, and Zaiqing Nie. 2018. CoLink: An Unsupervised Framework for User Identity Linkage. In The AAAI Conference on Artificial Intelligence. AAAI Press, 5714--5721."},{"key":"e_1_3_2_1_61_1","volume-title":"Deeplink: A deep learning approach for user identity linkage","author":"Zhou Fan","year":"2018","unstructured":"Fan Zhou , Lei Liu , Kunpeng Zhang , Goce Trajcevski , Jin Wu , and Ting Zhong . 2018 . Deeplink: A deep learning approach for user identity linkage . In IEEE INFOCOM. IEEE , 1313--1321. Fan Zhou, Lei Liu, Kunpeng Zhang, Goce Trajcevski, Jin Wu, and Ting Zhong. 2018. Deeplink: A deep learning approach for user identity linkage. In IEEE INFOCOM. IEEE, 1313--1321."},{"key":"e_1_3_2_1_62_1","unstructured":"Kai Zhou Tomasz P. Michalak Marcin Waniek Talal Rahwan and Yevgeniy Vorobeychik. 2019. Attacking Similarity-Based Link Prediction in Social Networks. In AAMAS. 305--313.  Kai Zhou Tomasz P. Michalak Marcin Waniek Talal Rahwan and Yevgeniy Vorobeychik. 2019. Attacking Similarity-Based Link Prediction in Social Networks. In AAMAS. 305--313."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449823"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_66_1","volume-title":"Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412","author":"Z\u00fcgner Daniel","year":"2019","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann . 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412 ( 2019 ). Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412 (2019)."}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Birmingham United Kingdom","acronym":"CIKM '23"},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3615084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:56Z","timestamp":1750178216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":64,"alternative-id":["10.1145\/3583780.3615084","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3615084","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}