{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:24Z","timestamp":1775815464004,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2057, U21B2036, U20B2060, U20B2062"],"award-info":[{"award-number":["U22B2057, U21B2036, U20B2060, U20B2062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFA0711403"],"award-info":[{"award-number":["2020YFA0711403"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3615095","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:26Z","timestamp":1697874326000},"page":"2188-2197","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Transferable Structure-based Adversarial Attack of Heterogeneous Graph Neural Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9049-8483","authenticated-orcid":false,"given":"Yu","family":"Shang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6049-603X","authenticated-orcid":false,"given":"Yudong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2040-7938","authenticated-orcid":false,"given":"Jiansheng","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0419-5514","authenticated-orcid":false,"given":"Depeng","family":"Jin","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5617-1659","authenticated-orcid":false,"given":"Yong","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Convex optimization","author":"Boyd Stephen","unstructured":"Stephen Boyd , Stephen P Boyd , and Lieven Vandenberghe . 2004. Convex optimization . Cambridge university press . Stephen Boyd, Stephen P Boyd, and Lieven Vandenberghe. 2004. Convex optimization. Cambridge university press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). Ieee 39--57.  Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). Ieee 39--57.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330673"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Wenqi Fan Yao Ma Qing Li Yuan He Eric Zhao Jiliang Tang and Dawei Yin. 2019a. Graph neural networks for social recommendation. In The world wide web conference. 417--426.  Wenqi Fan Yao Ma Qing Li Yuan He Eric Zhao Jiliang Tang and Dawei Yin. 2019a. Graph neural networks for social recommendation. In The world wide web conference. 417--426.","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467168"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3568022"},{"key":"e_1_3_2_1_7_1","volume-title":"Causal Inference in Recommender Systems: A Survey and Future Directions. arXiv preprint arXiv:2208.12397","author":"Gao Chen","year":"2022","unstructured":"Chen Gao , Yu Zheng , Wenjie Wang , Fuli Feng , Xiangnan He , and Yong Li. 2022. Causal Inference in Recommender Systems: A Survey and Future Directions. arXiv preprint arXiv:2208.12397 ( 2022 ). Chen Gao, Yu Zheng, Wenjie Wang, Fuli Feng, Xiangnan He, and Yong Li. 2022. Causal Inference in Recommender Systems: A Survey and Future Directions. arXiv preprint arXiv:2208.12397 (2022)."},{"key":"e_1_3_2_1_8_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557664"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301946"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380027"},{"key":"e_1_3_2_1_13_1","volume-title":"Structack: Structure-based adversarial attacks on graph neural networks. arXiv preprint arXiv:2107.11327","author":"Hussain Hussain","year":"2021","unstructured":"Hussain Hussain , Tomislav Duricic , Elisabeth Lex , Denis Helic , Markus Strohmaier , and Roman Kern . 2021 . Structack: Structure-based adversarial attacks on graph neural networks. arXiv preprint arXiv:2107.11327 (2021). Hussain Hussain, Tomislav Duricic, Elisabeth Lex, Denis Helic, Markus Strohmaier, and Roman Kern. 2021. Structack: Structure-based adversarial attacks on graph neural networks. arXiv preprint arXiv:2107.11327 (2021)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403050"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"e_1_3_2_1_16_1","volume-title":"Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770","author":"Liu Yanpei","year":"2016","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . 2016. Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770 ( 2016 ). Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2016. Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770 (2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272010"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403207"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 1150--1160","author":"Lv Qingsong","year":"2021","unstructured":"Qingsong Lv , Ming Ding , Qiang Liu , Yuxiang Chen , Wenzheng Feng , Siming He , Chang Zhou , Jianguo Jiang , Yuxiao Dong , and Jie Tang . 2021 . Are we really making much progress? Revisiting, benchmarking and refining heterogeneous graph neural networks . In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 1150--1160 . Qingsong Lv, Ming Ding, Qiang Liu, Yuxiang Chen, Wenzheng Feng, Siming He, Chang Zhou, Jianguo Jiang, Yuxiao Dong, and Jie Tang. 2021. Are we really making much progress? Revisiting, benchmarking and refining heterogeneous graph neural networks. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 1150--1160."},{"key":"e_1_3_2_1_20_1","volume-title":"Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750","author":"Ma Yao","year":"2019","unstructured":"Yao Ma , Suhang Wang , Tyler Derr , Lingfei Wu , and Jiliang Tang . 2019. Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750 ( 2019 ). Yao Ma, Suhang Wang, Tyler Derr, Lingfei Wu, and Jiliang Tang. 2019. Attacking graph convolutional networks via rewiring. arXiv preprint arXiv:1906.03750 (2019)."},{"key":"e_1_3_2_1_21_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 ( 2017 ). Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498505"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412691"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3201243"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"e_1_3_2_1_28_1","volume-title":"MHNF: Multi-hop Heterogeneous Neighborhood information Fusion graph representation learning","author":"Sun Yundong","year":"2022","unstructured":"Yundong Sun , Dongjie Zhu , Haiwen Du , and Zhaoshuo Tian . 2022 b. MHNF: Multi-hop Heterogeneous Neighborhood information Fusion graph representation learning . IEEE Transactions on Knowledge and Data Engineering ( 2022). Yundong Sun, Dongjie Zhu, Haiwen Du, and Zhaoshuo Tian. 2022b. MHNF: Multi-hop Heterogeneous Neighborhood information Fusion graph representation learning. IEEE Transactions on Knowledge and Data Engineering (2022)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371851"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467295"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330989"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Xiao Wang Houye Ji Chuan Shi Bai Wang Yanfang Ye Peng Cui and Philip S Yu. 2019b. Heterogeneous graph attention network. In The world wide web conference. 2022--2032.  Xiao Wang Houye Ji Chuan Shi Bai Wang Yanfang Ye Peng Cui and Philip S Yu. 2019b. Heterogeneous graph attention network. In The world wide web conference. 2022--2032.","DOI":"10.1145\/3308558.3313562"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0290-3"},{"key":"e_1_3_2_1_34_1","volume-title":"Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610","author":"Wu Huijun","year":"2019","unstructured":"Huijun Wu , Chen Wang , Yuriy Tyshetskiy , Andrew Docherty , Kai Lu , and Liming Zhu . 2019. Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610 ( 2019 ). Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019. Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610 (2019)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00124"},{"key":"e_1_3_2_1_36_1","volume-title":"Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu , Hongge Chen , Sijia Liu , Pin-Yu Chen , Tsui-Wei Weng , Mingyi Hong , and Xue Lin . 2019. Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214 ( 2019 ). Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214 (2019)."},{"key":"e_1_3_2_1_37_1","volume-title":"Graph transformer networks. Advances in neural information processing systems","author":"Yun Seongjun","year":"2019","unstructured":"Seongjun Yun , Minbyul Jeong , Raehyun Kim , Jaewoo Kang , and Hyunwoo J Kim . 2019. Graph transformer networks. Advances in neural information processing systems , Vol. 32 ( 2019 ). Seongjun Yun, Minbyul Jeong, Raehyun Kim, Jaewoo Kang, and Hyunwoo J Kim. 2019. Graph transformer networks. Advances in neural information processing systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20357"},{"key":"e_1_3_2_1_39_1","volume-title":"A Novel, Modularized and Reproducible Platform to Evaluate Heterogeneous Graph Neural Network. arXiv preprint arXiv:2202.09177","author":"Zhao Tianyu","year":"2022","unstructured":"Tianyu Zhao , Cheng Yang , Yibo Li , Quan Gan , Zhenyi Wang , Fengqi Liang , Huan Zhao , Yingxia Shao , Xiao Wang , and Chuan Shi . 2022. Space4HGNN : A Novel, Modularized and Reproducible Platform to Evaluate Heterogeneous Graph Neural Network. arXiv preprint arXiv:2202.09177 ( 2022 ). Tianyu Zhao, Cheng Yang, Yibo Li, Quan Gan, Zhenyi Wang, Fengqi Liang, Huan Zhao, Yingxia Shao, Xiao Wang, and Chuan Shi. 2022. Space4HGNN: A Novel, Modularized and Reproducible Platform to Evaluate Heterogeneous Graph Neural Network. arXiv preprint arXiv:2202.09177 (2022)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380159"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330851"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","location":"Birmingham United Kingdom","acronym":"CIKM '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3615095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:56Z","timestamp":1750178216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":42,"alternative-id":["10.1145\/3583780.3615095","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3615095","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}