{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:50:20Z","timestamp":1776275420915,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Army Research Office (ARO)","award":["W911NF-21-1- 0198"],"award-info":[{"award-number":["W911NF-21-1- 0198"]}]},{"name":"Department of Homeland Security (DHS)","award":["E205949D"],"award-info":[{"award-number":["E205949D"]}]},{"name":"Cisco Faculty Research Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671910","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:54:55Z","timestamp":1724561695000},"page":"4386-4397","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6153-2739","authenticated-orcid":false,"given":"Zhiwei","family":"Zhang","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1591-7172","authenticated-orcid":false,"given":"Minhua","family":"Lin","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9715-0280","authenticated-orcid":false,"given":"Enyan","family":"Dai","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-4878","authenticated-orcid":false,"given":"Suhang","family":"Wang","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330112"},{"key":"e_1_3_2_2_3_1","volume-title":"Proflip: Targeted trojan attack with progressive bit flips. In ICCV. 7718--7727.","author":"Chen Huili","year":"2021","unstructured":"Huili Chen, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. 2021. Proflip: Targeted trojan attack with progressive bit flips. In ICCV. 7718--7727."},{"key":"e_1_3_2_2_4_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Zhenxing Chen Bo Liu Meiqing Wang Peng Dai Jun Lv and Liefeng Bo. 2020. Generative adversarial attributed network anomaly detection. In CIKM. 1989--1992.","DOI":"10.1145\/3340531.3412070"},{"key":"e_1_3_2_2_6_1","volume-title":"Graph-Augmented Normalizing Flows for Anomaly Detection of Multiple Time Series. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=45L_dgP48Vd","author":"Dai Enyan","year":"2022","unstructured":"Enyan Dai and Jie Chen. 2022. Graph-Augmented Normalizing Flows for Anomaly Detection of Multiple Time Series. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=45L_dgP48Vd"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Enyan Dai Wei Jin Hui Liu and Suhang Wang. 2022. Towards robust graph neural networks for noisy graphs with sparse labels. In WSDM. 181--191.","DOI":"10.1145\/3488560.3498408"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583392"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","unstructured":"Enyan Dai and Suhang Wang. 2021. Say No to the Discrimination: Learning Fair Graph Neural Networks with Limited Sensitive Attribute Information (WSDM '21). 680--688. https:\/\/doi.org\/10.1145\/3437963.3441752","DOI":"10.1145\/3437963.3441752"},{"key":"e_1_3_2_2_10_1","volume-title":"Deep Anomaly Detection on Attributed Networks. In SIAM International Conference on Data Mining (SDM).","author":"Ding Kaize","year":"2019","unstructured":"Kaize Ding, Jundong Li, Rohit Bhanushali, and Huan Liu. 2019. Deep Anomaly Detection on Attributed Networks. In SIAM International Conference on Data Mining (SDM)."},{"key":"e_1_3_2_2_11_1","first-page":"18944","article-title":"Backdoor attack with imperceptible input and latent modification","volume":"34","author":"Doan Khoa","year":"2021","unstructured":"Khoa Doan, Yingjie Lao, and Ping Li. 2021. Backdoor attack with imperceptible input and latent modification. Advances in Neural Information Processing Systems, Vol. 34 (2021), 18944--18957.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053387"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313488"},{"key":"e_1_3_2_2_14_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_2_16_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_2_17_1","volume-title":"Open graph benchmark: Datasets for machine learning on graphs. NIPs","author":"Hu Weihua","year":"2020","unstructured":"Weihua Hu, Matthias Fey, Marinka Zitnik, Yuxiao Dong, Hongyu Ren, Bowen Liu, Michele Catasta, and Jure Leskovec. 2020. Open graph benchmark: Datasets for machine learning on graphs. NIPs (2020), 22118--22133."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2816564"},{"key":"e_1_3_2_2_19_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_2_20_1","volume-title":"Variational Graph Auto-Encoders. NIPS Workshop on Bayesian Deep Learning","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Variational Graph Auto-Encoders. NIPS Workshop on Bayesian Deep Learning (2016)."},{"key":"e_1_3_2_2_21_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR."},{"key":"e_1_3_2_2_22_1","volume-title":"Weight poisoning attacks on pre-trained models. arXiv preprint arXiv:2004.06660","author":"Kurita Keita","year":"2020","unstructured":"Keita Kurita, Paul Michel, and Graham Neubig. 2020. Weight poisoning attacks on pre-trained models. arXiv preprint arXiv:2004.06660 (2020)."},{"key":"e_1_3_2_2_23_1","volume-title":"Backdoor learning: A survey","author":"Li Yiming","year":"2022","unstructured":"Yiming Li, Yong Jiang, Zhifeng Li, and Shu-Tao Xia. 2022. Backdoor learning: A survey. IEEE Transactions on Neural Networks and Learning Systems (2022)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"e_1_3_2_2_25_1","volume-title":"Certifiably Robust Graph Contrastive Learning. In Thirty-seventh Conference on Neural Information Processing Systems.","author":"Lin Minhua","year":"2023","unstructured":"Minhua Lin, Teng Xiao, Enyan Dai, Xiang Zhang, and Suhang Wang. 2023. Certifiably Robust Graph Contrastive Learning. In Thirty-seventh Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_26_1","first-page":"27021","article-title":"BOND: Benchmarking Unsupervised Outlier Node Detection on Static Attributed Graphs","volume":"35","author":"Liu Kay","year":"2022","unstructured":"Kay Liu, Yingtong Dou, Yue Zhao, Xueying Ding, Xiyang Hu, Ruitong Zhang, Kaize Ding, Canyu Chen, Hao Peng, Kai Shu, Lichao Sun, Jundong Li, George H Chen, Zhihao Jia, and Philip S Yu. 2022. BOND: Benchmarking Unsupervised Outlier Node Detection on Static Attributed Graphs. In Advances in Neural Information Processing Systems, Vol. 35. 27021--27035.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_27_1","volume-title":"Reflection backdoor: A natural backdoor attack on deep neural networks","author":"Liu Yunfei","unstructured":"Yunfei Liu, Xingjun Ma, James Bailey, and Feng Lu. 2020. Reflection backdoor: A natural backdoor attack on deep neural networks. In ECCV. Springer, 182--199."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501815"},{"key":"e_1_3_2_2_29_1","volume-title":"Overcoming Pitfalls in Graph Contrastive Learning Evaluation: Toward Comprehensive Benchmarks. arXiv preprint arXiv:2402.15680","author":"Ma Qian","year":"2024","unstructured":"Qian Ma, Hongliang Chi, Hengrui Zhang, Kay Liu, Zhiwei Zhang, Lu Cheng, Suhang Wang, Philip S Yu, and Yao Ma. 2024. Overcoming Pitfalls in Graph Contrastive Learning Evaluation: Toward Comprehensive Benchmarks. arXiv preprint arXiv:2402.15680 (2024)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-56773-5"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403064"},{"key":"e_1_3_2_2_35_1","volume-title":"Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.","author":"Tuor Aaron","year":"2017","unstructured":"Aaron Tuor, Samuel Kaplan, Brian Hutchinson, Nicole Nichols, and Sean Robinson. 2017. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In Workshops at the Thirty-First AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_36_1","volume-title":"Graph Attention Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJXMpikCZ","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJXMpikCZ"},{"key":"e_1_3_2_2_37_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Xi Zhaohan","year":"2021","unstructured":"Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang. 2021. Graph backdoor. In 30th USENIX Security Symposium (USENIX Security 21). 1523--1540."},{"key":"e_1_3_2_2_38_1","volume-title":"Efficient Contrastive Learning for Fast and Accurate Inference on Graphs. In Forty-first International Conference on Machine Learning. https:\/\/openreview.net\/forum?id=vsy21Xodrt","author":"Xiao Teng","year":"2024","unstructured":"Teng Xiao, Huaisheng Zhu, Zhiwei Zhang, Zhimeng Guo, Charu C. Aggarwal, Suhang Wang, and Vasant G Honavar. 2024. Efficient Contrastive Learning for Fast and Accurate Inference on Graphs. In Forty-first International Conference on Machine Learning. https:\/\/openreview.net\/forum?id=vsy21Xodrt"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","unstructured":"Junjie Xu Enyan Dai Xiang Zhang and Suhang Wang. 2022. HP-GMN: Graph Memory Networks for Heterophilous Graphs. In ICDM. 1263--1268. https:\/\/doi.org\/10.1109\/ICDM54844.2022.00165","DOI":"10.1109\/ICDM54844.2022.00165"},{"key":"e_1_3_2_2_40_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=ryGs6iA5Km","author":"Xu Keyulu","year":"2019","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=ryGs6iA5Km"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"e_1_3_2_2_42_1","unstructured":"Zhilin Yang William Cohen and Ruslan Salakhudinov. 2016. Revisiting semi-supervised learning with graph embeddings. In ICML. PMLR 40--48."},{"key":"e_1_3_2_2_43_1","first-page":"5812","article-title":"Graph Contrastive Learning with Augmentations","volume":"33","author":"You Yuning","year":"2020","unstructured":"Yuning You, Tianlong Chen, Yongduo Sui, Ting Chen, Zhangyang Wang, and Yang Shen. 2020. Graph Contrastive Learning with Augmentations. In Advances in Neural Information Processing Systems, Vol. 33. 5812--5823. https:\/\/proceedings.neurips.cc\/paper\/2020\/file\/3fe230348e9a12c13120749e3f9fa4cd-Paper.pdf","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_44_1","volume-title":"GraphSAINT: Graph Sampling Based Inductive Learning Method. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJe8pkHFwS","author":"Zeng Hanqing","year":"2020","unstructured":"Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgopal Kannan, and Viktor Prasanna. 2020. GraphSAINT: Graph Sampling Based Inductive Learning Method. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BJe8pkHFwS"},{"key":"e_1_3_2_2_45_1","unstructured":"Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks (NIPS'18)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V36I8.20898"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441720"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495161"},{"key":"e_1_3_2_2_50_1","unstructured":"Huaisheng Zhu Guoji Fu Zhimeng Guo Zhiwei Zhang Teng Xiao and Suhang Wang. 2023. Fairness-aware Message Passing for Graph Neural Networks. arxiv: 2306.11132 [cs.LG]"},{"key":"e_1_3_2_2_51_1","volume-title":"Deep Graph Contrastive Representation Learning. In ICML Workshop on Graph Representation Learning and Beyond. http:\/\/arxiv.org\/abs\/2006","author":"Zhu Yanqiao","year":"2020","unstructured":"Yanqiao Zhu, Yichen Xu, Feng Yu, Qiang Liu, Shu Wu, and Liang Wang. 2020. Deep Graph Contrastive Representation Learning. In ICML Workshop on Graph Representation Learning and Beyond. http:\/\/arxiv.org\/abs\/2006.04131"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Barcelona Spain","acronym":"KDD '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:15Z","timestamp":1750291455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":51,"alternative-id":["10.1145\/3637528.3671910","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671910","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}