{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:22:08Z","timestamp":1762273328411,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the French National Research Agency with the reference ANR-23-IAS4-0001 (CKRISP)"},{"name":"the National Research Foundation, Singapore and Infocomm Media Development Authority"},{"name":"Systematic Major Project of China State Railway Group Corporation Limited","award":["No.P2023W002"],"award-info":[{"award-number":["No.P2023W002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671956","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:54:55Z","timestamp":1724561695000},"page":"2094-2105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Cross-Context Backdoor Attacks against Graph Prompt Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0732-0261","authenticated-orcid":false,"given":"Xiaoting","family":"Lyu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9035-6718","authenticated-orcid":false,"given":"Yufei","family":"Han","sequence":"additional","affiliation":[{"name":"Inria, Univ. Rennes, IRISA, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5974-1589","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University &amp; Xi'an Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4831-0748","authenticated-orcid":false,"given":"Hangwei","family":"Qian","sequence":"additional","affiliation":[{"name":"CFAR, A*STAR, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8095-4637","authenticated-orcid":false,"given":"Ivor","family":"Tsang","sequence":"additional","affiliation":[{"name":"CFAR, A*STAR, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3574-5665","authenticated-orcid":false,"given":"Xiangliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti1007"},{"key":"e_1_3_2_2_2_1","volume-title":"Sihan Xu, Ying Zhang, and Xiaojie Yuan.","author":"Cai Xiangrui","year":"2022","unstructured":"Xiangrui Cai, haidong xu, Sihan Xu, Ying Zhang, and Xiaojie Yuan. 2022. BadPrompt: Backdoor Attacks on Continuous Prompts. In Advances in Neural Information Processing Systems, Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (Eds.). https:\/\/openreview.net\/forum?id=rlN6fO3OrP"},{"key":"e_1_3_2_2_3_1","volume-title":"The Tenth International Conference on Learning Representations, ICLR 2022","author":"Chen Kangjie","year":"2022","unstructured":"Kangjie Chen, Yuxian Meng, Xiaofei Sun, Shangwei Guo, Tianwei Zhang, Jiwei Li, and Chun Fan. 2022. BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models. In The Tenth International Conference on Learning Representations, ICLR 2022, Virtual Event, April 25--29, 2022. OpenReview.net."},{"key":"e_1_3_2_2_4_1","volume-title":"ULTRA-DP: Unifying Graph Pre-training with Multi-task Graph Dual Prompt. CoRR","author":"Chen Mouxiang","year":"2023","unstructured":"Mouxiang Chen, Zemin Liu, Chenghao Liu, Jundong Li, Qiheng Mao, and Jianling Sun. 2023. ULTRA-DP: Unifying Graph Pre-training with Multi-task Graph Dual Prompt. CoRR, Vol. abs\/2310.14845 (2023). showeprint[arXiv]2310.14845"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583392"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583392"},{"key":"e_1_3_2_2_7_1","volume-title":"UOR: Universal Backdoor Attacks on Pre-trained Language Models. CoRR","author":"Du Wei","year":"2023","unstructured":"Wei Du, Peixuan Li, Boqun Li, Haodong Zhao, and Gongshen Liu. 2023. UOR: Universal Backdoor Attacks on Pre-trained Language Models. CoRR, Vol. abs\/2305.09574 (2023). showeprint[arXiv]2305.09574"},{"key":"e_1_3_2_2_8_1","volume-title":"Prompt Tuning for Graph Neural Networks. CoRR","author":"Fang Taoran","year":"2022","unstructured":"Taoran Fang, Yunchao Zhang, Yang Yang, and Chunping Wang. 2022. Prompt Tuning for Graph Neural Networks. CoRR, Vol. abs\/2209.15240 (2022). showeprint[arXiv]2209.15240"},{"key":"e_1_3_2_2_9_1","volume-title":"Universal Prompt Tuning for Graph Neural Networks. In Thirty-seventh Conference on Neural Information Processing Systems. https:\/\/openreview.net\/forum?id=0LmWBhIYLi","author":"Fang Taoran","year":"2023","unstructured":"Taoran Fang, Yunchao Mercer Zhang, Yang Yang, Chunping Wang, and Lei CHEN. 2023. Universal Prompt Tuning for Graph Neural Networks. In Thirty-seventh Conference on Neural Information Processing Systems. https:\/\/openreview.net\/forum?id=0LmWBhIYLi"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.295"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2310.17394"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583386"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning, ICML 2015","volume":"105","author":"Long Mingsheng","year":"2015","unstructured":"Mingsheng Long, Yue Cao, Jianmin Wang, and Michael I. Jordan. 2015. Learning Transferable Features with Deep Adaptation Networks. In Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, Lille, France, 6--11 July 2015 (JMLR, Vol. 37). JMLR.org, 97--105."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2310.15318"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.867"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6398"},{"key":"e_1_3_2_2_18_1","volume-title":"Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868","author":"Shchur Oleksandr","year":"2018","unstructured":"Oleksandr Shchur, Maximilian Mumme, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2018. Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868 (2018)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92638-0_17"},{"key":"e_1_3_2_2_20_1","volume-title":"Masked label prediction: Unified message passing model for semi-supervised classification. arXiv preprint arXiv:2009.03509","author":"Shi Yunsheng","year":"2020","unstructured":"Yunsheng Shi, Zhengjie Huang, Shikun Feng, Hui Zhong, Wenjin Wang, and Yu Sun. 2020. Masked label prediction: Unified message passing model for semi-supervised classification. arXiv preprint arXiv:2009.03509 (2020)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2309.10131"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599256"},{"key":"e_1_3_2_2_23_1","volume-title":"Graph Prompt Learning: A Comprehensive Survey and Beyond. arXiv:2311.16534","author":"Sun Xiangguo","year":"2023","unstructured":"Xiangguo Sun, Jiawen Zhang, Xixi Wu, Hong Cheng, Yun Xiong, and Jia Li. 2023. Graph Prompt Learning: A Comprehensive Survey and Beyond. arXiv:2311.16534 (2023). arxiv: 2311.16534"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023","author":"Tan Zhen","year":"2023","unstructured":"Zhen Tan, Ruocheng Guo, Kaize Ding, and Huan Liu. 2023. Virtual Node Tuning for Few-shot Node Classification. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023, Long Beach, CA, USA, August 6--10, 2023. ACM, 2177--2188."},{"key":"e_1_3_2_2_25_1","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio Yoshua Bengio et al. 2017. Graph attention networks. stat Vol. 1050 20 (2017) 10--48550."},{"key":"e_1_3_2_2_26_1","volume-title":"Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610","author":"Wu Huijun","year":"2019","unstructured":"Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019. Adversarial examples on graph data: Deep insights into attack and defense. arXiv preprint arXiv:1903.01610 (2019)."},{"key":"e_1_3_2_2_27_1","volume-title":"Graph Backdoor. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Xi Zhaohan","year":"2021","unstructured":"Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang. 2021. Graph Backdoor. In 30th USENIX Security Symposium, USENIX Security 2021, August 11--13, 2021. USENIX Association, 1523--1540."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3563531"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"e_1_3_2_2_30_1","volume-title":"International conference on machine learning. PMLR, 40--48","author":"Yang Zhilin","year":"2016","unstructured":"Zhilin Yang, William Cohen, and Ruslan Salakhudinov. 2016. Revisiting semi-supervised learning with graph embeddings. In International conference on machine learning. PMLR, 40--48."},{"key":"e_1_3_2_2_31_1","unstructured":"Hongwei Yao Jian Lou and Zhan Qin. 2023. PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models. arxiv: 2310.12439 [cs.CL]"},{"key":"e_1_3_2_2_32_1","volume-title":"Graph contrastive learning with augmentations. Advances in neural information processing systems","author":"You Yuning","year":"2020","unstructured":"Yuning You, Tianlong Chen, Yongduo Sui, Ting Chen, Zhangyang Wang, and Yang Shen. 2020. Graph contrastive learning with augmentations. Advances in neural information processing systems, Vol. 33 (2020), 5812--5823."},{"key":"e_1_3_2_2_33_1","volume-title":"Graph Contrastive Backdoor Attacks. In International Conference on Machine Learning, ICML 2023","volume":"40910","author":"Zhang Hangfan","year":"2023","unstructured":"Hangfan Zhang, Jinghui Chen, Lu Lin, Jinyuan Jia, and Dinghao Wu. 2023. Graph Contrastive Backdoor Attacks. In International Conference on Machine Learning, ICML 2023, 23--29 July 2023, Honolulu, Hawaii, USA (Proceedings of Machine Learning Research, Vol. 202). PMLR, 40888--40910."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25615"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","author":"Zhang Xiang","year":"2020","unstructured":"Xiang Zhang and Marinka Zitnik. 2020. GNNGUARD: defending graph neural networks against adversarial attacks. In Proceedings of the 34th International Conference on Neural Information Processing Systems (Vancouver, BC, Canada) (NIPS'20). Curran Associates Inc., Red Hook, NY, USA, Article 777, 13 pages."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"},{"key":"e_1_3_2_2_37_1","unstructured":"Shuai Zhao and Jinming Wen. 2023. Prompt as Triggers for Backdoor Attack: Examining the Vulnerability in Language Models. https:\/\/synthical.com\/article\/7b1c5bc5--4335--4a54-b52b-1289fae245d3. arxiv: 2305.01219 [cs.AI]"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Barcelona Spain","acronym":"KDD '24"},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:05Z","timestamp":1750291565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":37,"alternative-id":["10.1145\/3637528.3671956","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671956","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}