{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:45:12Z","timestamp":1772909112005,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3651501","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"485-488","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Everything Perturbed All at Once: Enabling Differentiable Graph Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6829-2650","authenticated-orcid":false,"given":"Haoran","family":"Liu","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4977-7160","authenticated-orcid":false,"given":"Bokun","family":"Wang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9916-0976","authenticated-orcid":false,"given":"Jianling","family":"Wang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9173-2690","authenticated-orcid":false,"given":"Xiangjue","family":"Dong","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7858-5438","authenticated-orcid":false,"given":"Tianbao","family":"Yang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8350-8528","authenticated-orcid":false,"given":"James","family":"Caverlee","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"ICLR","author":"Bepler T.","year":"2019","unstructured":"Bepler, T., and Berger, B. Learning protein sequence embeddings using information from structure. In ICLR (2019)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498410"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"e_1_3_2_2_4_1","volume-title":"ICLR","year":"2019","unstructured":"et al., H. L. DARTS: Differentiable architecture search. In ICLR (2019)."},{"key":"e_1_3_2_2_5_1","first-page":"1126","volume-title":"PMLR","author":"Finn C.","unstructured":"Finn, C., Abbeel, P., and Levine, S. Model-agnostic meta-learning for fast adaptation of deep networks. In ICML (2017), PMLR, pp. 1126--1135."},{"key":"e_1_3_2_2_6_1","volume-title":"ICLR","author":"Goodfellow I.","year":"2015","unstructured":"Goodfellow, I., Shlens, J., and Szegedy, C. Explaining and harnessing adversarial examples. In ICLR (2015)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403049"},{"key":"e_1_3_2_2_8_1","volume-title":"Are gradients on graph structure reliable in gray-box attacks? In CIKM","author":"Liu Z.","year":"2022","unstructured":"Liu, Z., Luo, Y., Wu, L., Li, S., Liu, Z., and Li, S. Z. Are gradients on graph structure reliable in gray-box attacks? In CIKM (2022)."},{"key":"e_1_3_2_2_9_1","volume-title":"NeurIPS","author":"Liu Z.","year":"2022","unstructured":"Liu, Z., Luo, Y.,Wu, L., Liu, Z., and Li, S. Z. Towards reasonable budget allocation in untargeted graph structure attacks via gradient debias. In NeurIPS (2022), A. H. Oh, A. Agarwal, D. Belgrave, and K. Cho, Eds."},{"key":"e_1_3_2_2_10_1","volume-title":"ICLR","author":"Madry A.","year":"2018","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. Towards deep learning models resistant to adversarial attacks. In ICLR (2018)."},{"key":"e_1_3_2_2_11_1","volume-title":"e. a. Automating the construction of internet portals with machine learning. Information Retrieval","author":"McCallum A. K.","year":"2000","unstructured":"McCallum, A. K. e. a. Automating the construction of internet portals with machine learning. Information Retrieval (2000)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnab014"},{"key":"e_1_3_2_2_13_1","volume-title":"Collective classification in network data. AI magazine 29, 3","author":"Sen P.","year":"2008","unstructured":"Sen, P., Namata, G., Bilgic, M., Getoor, L., Galligher, B., and Eliassi-Rad, T. Collective classification in network data. AI magazine 29, 3 (2008), 93--93."},{"key":"e_1_3_2_2_14_1","volume-title":"ICLR","author":"Casanova A.","year":"2018","unstructured":"G., Casanova, A., Romero, A., Li\u00f2, P., and Bengio, Y. Graph attention networks. In ICLR (2018)."},{"key":"e_1_3_2_2_15_1","volume-title":"e. a. Hiding individuals and communities in a social network. Nature Human Behaviour","author":"Waniek M.","year":"2018","unstructured":"Waniek, M. e. a. Hiding individuals and communities in a social network. Nature Human Behaviour (2018)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/544"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20357"},{"key":"e_1_3_2_2_19_1","volume-title":"A survey on graph structure learning: Progress and opportunities. arXiv e-prints","author":"Zhu Y.","year":"2021","unstructured":"Zhu, Y., Xu, W., Zhang, J., Du, Y., Zhang, J., Liu, Q., Yang, C., and Wu, S. A survey on graph structure learning: Progress and opportunities. arXiv e-prints (2021), arXiv--2103."},{"key":"e_1_3_2_2_20_1","volume-title":"ICLR","author":"Z\u00fcgner D.","year":"2019","unstructured":"Z\u00fcgner, D., and G\u00fcnnemann, S. Adversarial attacks on graph neural networks via meta learning. In ICLR (2019)."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3651501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:38:11Z","timestamp":1755823091000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651501"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":20,"alternative-id":["10.1145\/3589335.3651501","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3651501","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}