{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:28Z","timestamp":1755907528946,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["No. 62106210"],"award-info":[{"award-number":["No. 62106210"]}]},{"name":"Hong Kong RGC","award":["PolyU25210821"],"award-info":[{"award-number":["PolyU25210821"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691376","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4949-4951","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: AuditVotes: A Framework towards Deployable Certified Robustness for GNNs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2295-912X","authenticated-orcid":false,"given":"Yuni","family":"Lai","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1383-2765","authenticated-orcid":false,"given":"Kai","family":"Zhou","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Machine Learning. PMLR, 1003--1013","author":"Bojchevski Aleksandar","year":"2020","unstructured":"Aleksandar Bojchevski, Johannes Gasteiger, and Stephan G\u00fcnnemann. 2020. Efficient robustness certificates for discrete data: Sparsity-aware randomized smoothing for graphs, images and more. In International Conference on Machine Learning. PMLR, 1003--1013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575637.3575646"},{"key":"e_1_3_2_1_3_1","volume-title":"Forty-first International Conference on Machine Learning (ICML).","author":"Lai Yuni","year":"2024","unstructured":"Yuni Lai, PAN Bailin, Kaihuang Chen, Yancheng Yuan, and Kai Zhou. 2024. Collective Certified Robustness against Graph Injection Attacks. In Forty-first International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_4_1","unstructured":"Yuni Lai and Kai Zhou. 2024. AuditVotes (Full Version). https:\/\/www4.comp.polyu.edu.hk\/~kaizhou\/publication_files\/AuditVotes.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00241"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179303"},{"key":"e_1_3_2_1_7_1","first-page":"7693","article-title":"Adversarial attack and defense on graph data: A survey","volume":"35","author":"Sun Lichao","year":"2022","unstructured":"Lichao Sun, Yingtong Dou, Carl Yang, Kai Zhang, JiWang, S Yu Philip, Lifang He, and Bo Li. 2022. Adversarial attack and defense on graph data: A survey. IEEE Transactions on Knowledge and Data Engineering 35, 8 (2022), 7693--7711.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence. 4816--4823","author":"Tyshetskiy Yuriy","year":"2019","unstructured":"HuijunWu, ChenWang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019. Adversarial examples for graph data: deep insights into attack and defense. In Proceedings of the 28th International Joint Conference on Artificial Intelligence. 4816--4823."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_10_1","volume-title":"Graph data augmentation for graph machine learning: A survey. arXiv preprint arXiv:2202.08871","author":"Zhao Tong","year":"2022","unstructured":"Tong Zhao, Wei Jin, Yozen Liu, Yingheng Wang, Gang Liu, Stephan G\u00fcnnemann, Neil Shah, and Meng Jiang. 2022. Graph data augmentation for graph machine learning: A survey. arXiv preprint arXiv:2202.08871 (2022)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:17:54Z","timestamp":1755843474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":10,"alternative-id":["10.1145\/3658644.3691376","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691376","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}