{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:41:27Z","timestamp":1771699287902,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSFC","award":["No.62225202, NSFC No.62302023"],"award-info":[{"award-number":["No.62225202, NSFC No.62302023"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714815","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"2098-2110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Robust Graph Learning Against Adversarial Evasion Attacks via Prior-Free Diffusion-Based Structure Purification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5742-3589","authenticated-orcid":false,"given":"Jiayi","family":"Luo","sequence":"first","affiliation":[{"name":"SKLCCSE, School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1930-3848","authenticated-orcid":false,"given":"Qingyun","family":"Sun","sequence":"additional","affiliation":[{"name":"SKLCCSE, School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9205-8610","authenticated-orcid":false,"given":"Haonan","family":"Yuan","sequence":"additional","affiliation":[{"name":"SKLCCSE, School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4643-8126","authenticated-orcid":false,"given":"Xingcheng","family":"Fu","sequence":"additional","affiliation":[{"name":"Key Lab of Education Blockchain and Intelligent Technology, Guangxi Normal University, Guilin, Guangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5152-0055","authenticated-orcid":false,"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[{"name":"SKLCCSE, School of Computer Science and Engineering, Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Lada A Adamic and Natalie Glance. 2005. The political blogosphere and the 2004 US election: divided they blog. In LinkKDD. 36--43.","DOI":"10.1145\/1134271.1134277"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Laurent Amsaleg Oussama Chelly Teddy Furon St\u00e9phane Girard Michael E Houle Ken-ichi Kawarabayashi and Michael Nett. 2015. Estimating local intrinsic dimensionality. In KDD. 29--38.","DOI":"10.1145\/2783258.2783405"},{"key":"e_1_3_2_1_3_1","first-page":"17981","article-title":"Structured denoising diffusion models in discrete state-spaces","volume":"34","author":"Austin Jacob","year":"2021","unstructured":"Jacob Austin, Daniel D Johnson, Jonathan Ho, Daniel Tarlow, and Rianne Van Den Berg. 2021. Structured denoising diffusion models in discrete state-spaces. NeurIPS, Vol. 34 (2021), 17981--17993.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_4_1","unstructured":"Sambaran Bandyopadhyay Manasvi Aggarwal and M Narasimha Murty. 2020. Hierarchically Attentive Graph Pooling with Subgraph Attention. In ICML."},{"key":"e_1_3_2_1_5_1","volume-title":"Evasion attacks against machine learning at test time","author":"Biggio Battista","unstructured":"Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim \u0160rndi\u0107, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion attacks against machine learning at test time. In ECML. Springer, 387--402."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Liang Chen Jintang Li Qibiao Peng Yang Liu Zibin Zheng and Carl Yang. 2021. Understanding structural vulnerability in graph convolutional networks. In IJCAI.","DOI":"10.24963\/ijcai.2021\/310"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Tianyi Chen and Charalampos Tsourakakis. 2022. Antibenford subgraphs: Unsupervised anomaly detection in financial networks. In KDD. 2762--2770.","DOI":"10.1145\/3534678.3539100"},{"key":"e_1_3_2_1_8_1","unstructured":"Xiaohui Chen Jiaxing He Xu Han and Li-Ping Liu. 2023. Efficient and degree-guided graph generation via discrete diffusion modeling. In ICML. 4585--4610."},{"key":"e_1_3_2_1_9_1","first-page":"19314","article-title":"Iterative deep graph learning for graph neural networks: Better and robust node embeddings","volume":"33","author":"Chen Yu","year":"2020","unstructured":"Yu Chen, Lingfei Wu, and Mohammed Zaki. 2020. Iterative deep graph learning for graph neural networks: Better and robust node embeddings. NeurIPS, Vol. 33 (2020), 19314--19326.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_10_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. In ICML. PMLR 1115--1124."},{"key":"e_1_3_2_1_11_1","volume-title":"Garnet: Reduced-rank topology learning for robust and scalable graph neural networks. In LoG. PMLR, 3--1.","author":"Deng Chenhui","year":"2022","unstructured":"Chenhui Deng, Xiuyu Li, Zhuo Feng, and Zhiru Zhang. 2022. Garnet: Reduced-rank topology learning for robust and scalable graph neural networks. In LoG. PMLR, 3--1."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2398954"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Negin Entezari Saba A Al-Sayouri Amirali Darvishzadeh and Evangelos E Papalexakis. 2020. All you need is low (rank) defending against adversarial attacks on graphs. In WSDM. 169--177.","DOI":"10.1145\/3336191.3371789"},{"key":"e_1_3_2_1_14_1","volume-title":"Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410","author":"Feinman Reuben","year":"2017","unstructured":"Reuben Feinman, Ryan R Curtin, Saurabh Shintre, and Andrew B Gardner. 2017. Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410 (2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"Xingcheng Fu Yisen Gao Yuecen Wei Qingyun Sun Hao Peng Jianxin Li and Xianxian Li. 2024. Hyperbolic Geometric Latent Diffusion Model for Graph Generation. In ICML."},{"key":"e_1_3_2_1_16_1","unstructured":"Yarin Gal and Zoubin Ghahramani. 2016. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In ICML. PMLR 1050--1059."},{"key":"e_1_3_2_1_17_1","first-page":"7637","article-title":"Robustness of graph neural networks at scale","volume":"34","author":"Geisler Simon","year":"2021","unstructured":"Simon Geisler, Tobias Schmidt, Hakan \u015eirin, Daniel Z\u00fcgner, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2021. Robustness of graph neural networks at scale. NeurIPS, Vol. 34 (2021), 7637--7649.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_18_1","unstructured":"Kilian Konstantin Haefeli Karolis Martinkus Nathana\u00ebl Perraudin and Roger Wattenhofer. 2022. Diffusion models for graphs benefit from discrete state spaces. In NeurIPS."},{"key":"e_1_3_2_1_20_1","volume-title":"G-mixup: Graph data augmentation for graph classification. In ICML. PMLR, 8230--8248.","author":"Han Xiaotian","year":"2022","unstructured":"Xiaotian Han, Zhimeng Jiang, Ninghao Liu, and Xia Hu. 2022. G-mixup: Graph data augmentation for graph classification. In ICML. PMLR, 8230--8248."},{"key":"e_1_3_2_1_21_1","volume-title":"Local intrinsic dimensionality I: an extreme-value-theoretic foundation for similarity applications","author":"Houle Michael E","unstructured":"Michael E Houle. 2017. Local intrinsic dimensionality I: an extreme-value-theoretic foundation for similarity applications. In SISAP. Springer, 64--79."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Yeonjun In Kanghoon Yoon Kibum Kim Kijung Shin and Chanyoung Park. 2024. Self-Guided Robust Graph Structure Refinement. In WWW. 697--708.","DOI":"10.1145\/3589334.3645522"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Yeonjun In Kanghoon Yoon and Chanyoung Park. 2023. Similarity preserving adversarial graph contrastive learning. In KDD. 867--878.","DOI":"10.1145\/3580305.3599503"},{"key":"e_1_3_2_1_24_1","volume-title":"Understanding isomorphism bias in graph data sets. arXiv preprint arXiv:1910.12091","author":"Ivanov Sergei","year":"2019","unstructured":"Sergei Ivanov, Sergei Sviridov, and Evgeny Burnaev. 2019. Understanding isomorphism bias in graph data sets. arXiv preprint arXiv:1910.12091 (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Wei Jin Tyler Derr Yiqi Wang Yao Ma Zitao Liu and Jiliang Tang. 2021. Node similarity preserving graph convolutional networks. In WWW. 148--156.","DOI":"10.1145\/3437963.3441735"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Wei Jin Yao Ma Xiaorui Liu Xianfeng Tang Suhang Wang and Jiliang Tang. 2020. Graph structure learning for robust graph neural networks. In KDD. 66--74.","DOI":"10.1145\/3394486.3403049"},{"key":"e_1_3_2_1_27_1","unstructured":"Jaehyeong Jo Seul Lee and Sung Ju Hwang. 2022. Score-based generative modeling of graphs via the system of stochastic differential equations. In ICML. PMLR 10362--10383."},{"key":"e_1_3_2_1_28_1","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_1_29_1","volume-title":"GUARD: Graph universal adversarial defense. In CIKM. 1198--1207.","author":"Li Jintang","year":"2023","unstructured":"Jintang Li, Jie Liao, Ruofan Wu, Liang Chen, Zibin Zheng, Jiawang Dan, Changhua Meng, and Weiqiang Wang. 2023b. GUARD: Graph universal adversarial defense. In CIKM. 1198--1207."},{"key":"e_1_3_2_1_30_1","unstructured":"Kuan Li Yang Liu Xiang Ao and Qing He. 2023c. Revisiting graph adversarial attack and defense from a data distribution perspective. In ICLR."},{"key":"e_1_3_2_1_31_1","volume-title":"Graphmaker: Can diffusion models generate large attributed graphs? arXiv","author":"Li Mufei","year":"2023","unstructured":"Mufei Li, Eleonora Krea\u010di\u0107, Vamsi K Potluru, and Pan Li. 2023a. Graphmaker: Can diffusion models generate large attributed graphs? arXiv (2023)."},{"key":"e_1_3_2_1_32_1","volume-title":"Deeprobust: A pytorch library for adversarial attacks and defenses. arXiv","author":"Li Yaxin","year":"2020","unstructured":"Yaxin Li, Wei Jin, Han Xu, and Jiliang Tang. 2020. Deeprobust: A pytorch library for adversarial attacks and defenses. arXiv (2020)."},{"key":"e_1_3_2_1_33_1","volume-title":"Learning deep generative models of graphs. ICLR","author":"Li Yujia","year":"2018","unstructured":"Yujia Li, Oriol Vinyals, Chris Dyer, Razvan Pascanu, and Peter Battaglia. 2018. Learning deep generative models of graphs. ICLR (2018)."},{"key":"e_1_3_2_1_34_1","unstructured":"Xiaorui Liu Wei Jin Yao Ma Yaxin Li Hua Liu Yiqi Wang Ming Yan and Jiliang Tang. 2021. Elastic graph neural networks. In ICML. PMLR 6837--6849."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02749-w"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Guanghui Ma Chunming Hu Ling Ge and Hong Zhang. 2023. Multi-View Robust Graph Representation Learning for Graph Classification.. In IJCAI. 4037--4045.","DOI":"10.24963\/ijcai.2023\/449"},{"key":"e_1_3_2_1_37_1","unstructured":"Xingjun Ma Bo Li Yisen Wang Sarah M Erfani Sudanthi Wijewickrema Grant Schoenebeck Dawn Song Michael E Houle and James Bailey. 2018. Characterizing adversarial subspaces using local intrinsic dimensionality. In ICLR."},{"key":"e_1_3_2_1_38_1","unstructured":"Alexander Quinn Nichol and Prafulla Dhariwal. 2021. Improved denoising diffusion probabilistic models. In ICML. PMLR 8162--8171."},{"key":"e_1_3_2_1_39_1","unstructured":"Chenhao Niu Yang Song Jiaming Song Shengjia Zhao Aditya Grover and Stefano Ermon. 2020. Permutation invariant graph generation via score-based generative modeling. In AISTATS. PMLR 4474--4484."},{"key":"e_1_3_2_1_40_1","volume-title":"Measuring information transfer. Physical review letters","author":"Schreiber Thomas","year":"2000","unstructured":"Thomas Schreiber. 2000. Measuring information transfer. Physical review letters, Vol. 85, 2 (2000), 461."},{"key":"e_1_3_2_1_41_1","volume-title":"Pitfalls of graph neural network evaluation. arXiv","author":"Shchur Oleksandr","year":"2018","unstructured":"Oleksandr Shchur, Maximilian Mumme, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2018. Pitfalls of graph neural network evaluation. arXiv (2018)."},{"key":"e_1_3_2_1_42_1","unstructured":"Yunsheng Shi Zhengjie Huang Shikun Feng Hui Zhong Wenjin Wang and Yu Sun. 2020. Masked label prediction: Unified message passing model for semi-supervised classification. In IJCAI."},{"key":"e_1_3_2_1_43_1","volume-title":"Density estimation for statistics and data analysis","author":"Silverman Bernard W","unstructured":"Bernard W Silverman. 2018. Density estimation for statistics and data analysis. Routledge."},{"key":"e_1_3_2_1_44_1","unstructured":"Jascha Sohl-Dickstein Eric Weiss Niru Maheswaranathan and Surya Ganguli. 2015. Deep unsupervised learning using nonequilibrium thermodynamics. In ICML. PMLR 2256--2265."},{"key":"e_1_3_2_1_45_1","volume-title":"NeurIPS","volume":"32","author":"Song Yang","year":"2019","unstructured":"Yang Song and Stefano Ermon. 2019. Generative modeling by estimating gradients of the data distribution. NeurIPS, Vol. 32 (2019)."},{"key":"e_1_3_2_1_46_1","first-page":"7693","article-title":"Adversarial attack and defense on graph data: A survey","volume":"35","author":"Sun Lichao","year":"2022","unstructured":"Lichao Sun, Yingtong Dou, Carl Yang, Kai Zhang, Ji Wang, S Yu Philip, Lifang He, and Bo Li. 2022a. Adversarial attack and defense on graph data: A survey. TKDE, Vol. 35, 8 (2022), 7693--7711.","journal-title":"TKDE"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20335"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Xianfeng Tang Yandong Li Yiwei Sun Huaxiu Yao Prasenjit Mitra and Suhang Wang. 2020. Transferring robustness for graph neural network against poisoning attacks. In WWW. 600--608.","DOI":"10.1145\/3336191.3371851"},{"key":"e_1_3_2_1_49_1","volume-title":"Digress: Discrete denoising diffusion for graph generation. In ICLR.","author":"Vignac Clement","year":"2022","unstructured":"Clement Vignac, Igor Krawczuk, Antoine Siraudin, Bohan Wang, Volkan Cevher, and Pascal Frossard. 2022. Digress: Discrete denoising diffusion for graph generation. In ICLR."},{"key":"e_1_3_2_1_50_1","volume-title":"Score-based denoising diffusion with non-isotropic gaussian noise models. arXiv preprint arXiv:2210.12254","author":"Voleti Vikram","year":"2022","unstructured":"Vikram Voleti, Christopher Pal, and Adam Oberman. 2022. Score-based denoising diffusion with non-isotropic gaussian noise models. arXiv preprint arXiv:2210.12254 (2022)."},{"key":"e_1_3_2_1_51_1","volume-title":"Revisiting adversarial attacks on graph neural networks for graph classification. TKDE","author":"Wang Xin","year":"2023","unstructured":"Xin Wang, Heng Chang, Beini Xie, Tian Bian, Shiji Zhou, Daixin Wang, Zhiqiang Zhang, and Wenwu Zhu. 2023. Revisiting adversarial attacks on graph neural networks for graph classification. TKDE (2023)."},{"key":"e_1_3_2_1_52_1","unstructured":"Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019. Adversarial examples on graph data: Deep insights into attack and defense. In IJCAI."},{"key":"e_1_3_2_1_53_1","unstructured":"Junran Wu Xueyuan Chen Ke Xu and Shangzhe Li. 2022a. Structural entropy guided graph hierarchical pooling. In ICML. PMLR 24017--24030."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494523"},{"key":"e_1_3_2_1_55_1","unstructured":"Ying-Xin Wu Xiang Wang An Zhang Xiangnan He and Tat-Seng Chua. 2022c. Discovering invariant rationales for graph neural networks. In ICLR."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90026-8"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Hui Xu Liyao Xiang Jiahao Yu Anqi Cao and Xinbing Wang. 2021. Speedup robust graph structure learning with low-rank information. In CIKM. 2241--2250.","DOI":"10.1145\/3459637.3482299"},{"key":"e_1_3_2_1_58_1","volume-title":"Mingyi Hong, and Xue Lin.","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology attack and defense for graph neural networks: An optimization perspective. In IJCAI."},{"key":"e_1_3_2_1_59_1","unstructured":"Zhilin Yang William Cohen and Ruslan Salakhudinov. 2016. Revisiting semi-supervised learning with graph embeddings. In ICML. PMLR 40--48."},{"key":"e_1_3_2_1_60_1","first-page":"5812","article-title":"Graph contrastive learning with augmentations","volume":"33","author":"You Yuning","year":"2020","unstructured":"Yuning You, Tianlong Chen, Yongduo Sui, Ting Chen, Zhangyang Wang, and Yang Shen. 2020. Graph contrastive learning with augmentations. NeurIPS, Vol. 33 (2020), 5812--5823.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_61_1","unstructured":"Junchi Yu Jie Cao and Ran He. 2022. Improving subgraph recognition with variational graph information bottleneck. In CVPR. 19396--19405."},{"key":"e_1_3_2_1_62_1","first-page":"2960","article-title":"Multivariate Extension of Matrix-Based R\u00e9nyi's \u03b1-Order Entropy Functional","volume":"42","author":"Yu Shujian","year":"2019","unstructured":"Shujian Yu, Luis Gonzalo Sanchez Giraldo, Robert Jenssen, and Jose C Principe. 2019. Multivariate Extension of Matrix-Based R\u00e9nyi's \u03b1-Order Entropy Functional. TPAMI, Vol. 42, 11 (2019), 2960--2966.","journal-title":"TPAMI"},{"key":"e_1_3_2_1_63_1","volume-title":"NeurIPS","volume":"36","author":"Yu Xi","year":"2024","unstructured":"Xi Yu, Xiang Gu, Haozhi Liu, and Jian Sun. 2024. Constructing non-isotropic Gaussian diffusion model using isotropic Gaussian diffusion model for image editing. NeurIPS, Vol. 36 (2024)."},{"key":"e_1_3_2_1_64_1","first-page":"9263","article-title":"Gnnguard: Defending graph neural networks against adversarial attacks","volume":"33","author":"Zhang Xiang","year":"2020","unstructured":"Xiang Zhang and Marinka Zitnik. 2020. Gnnguard: Defending graph neural networks against adversarial attacks. NeurIPS, Vol. 33 (2020), 9263--9275.","journal-title":"NeurIPS"},{"key":"e_1_3_2_1_65_1","volume-title":"Hierarchical graph pooling with structure learning. arXiv","author":"Zhang Zhen","year":"2019","unstructured":"Zhen Zhang, Jiajun Bu, Martin Ester, Jianfeng Zhang, Chengwei Yao, Zhi Yu, and Can Wang. 2019. Hierarchical graph pooling with structure learning. arXiv (2019)."},{"key":"e_1_3_2_1_66_1","volume-title":"Can Large Language Models Improve the Adversarial Robustness of Graph Neural Networks? arXiv","author":"Zhang Zhongjian","year":"2024","unstructured":"Zhongjian Zhang, Xiao Wang, Huichi Zhou, Yue Yu, Mengmei Zhang, Cheng Yang, and Chuan Shi. 2024. Can Large Language Models Improve the Adversarial Robustness of Graph Neural Networks? arXiv (2024)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Jianan Zhao Qianlong Wen Mingxuan Ju Chuxu Zhang and Yanfang Ye. 2023. Self-supervised graph structure refinement for graph neural networks. In WSDM. 159--167.","DOI":"10.1145\/3539597.3570455"},{"key":"e_1_3_2_1_68_1","volume-title":"Graph Networks Stand Strong: Enhancing Robustness via Stability Constraints","author":"Zhao Zhe","unstructured":"Zhe Zhao, Pengkun Wang, Haibin Wen, Yudong Zhang, Binwu Wang, and Yang Wang. 2024. Graph Networks Stand Strong: Enhancing Robustness via Stability Constraints. In ICASSP. IEEE, 7315--7319."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Zhilun Zhou Yu Liu Jingtao Ding Depeng Jin and Yong Li. 2023. Hierarchical knowledge graph learning enabled socioeconomic indicator prediction in location-based social network. In WWW. 122--132.","DOI":"10.1145\/3543507.3583239"},{"key":"e_1_3_2_1_70_1","unstructured":"Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust graph convolutional networks against adversarial attacks. In KDD. 1399--1407."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD. 2847--2856.","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR.","DOI":"10.24963\/ijcai.2019\/872"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:42Z","timestamp":1750295922000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":71,"alternative-id":["10.1145\/3696410.3714815","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714815","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}