{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:35Z","timestamp":1750309595081,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T00:00:00Z","timestamp":1736467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,10]]},"DOI":"10.1145\/3727353.3727432","type":"proceedings-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T16:31:13Z","timestamp":1748363473000},"page":"493-497","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Dismantling Suppression Method Based on Gradient Optimization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2376-4355","authenticated-orcid":false,"given":"Peidong","family":"Gao","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0205-991X","authenticated-orcid":false,"given":"Xiaole","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3374-2347","authenticated-orcid":false,"given":"Jiacong","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9944-6709","authenticated-orcid":false,"given":"Yinghao","family":"Fu","sequence":"additional","affiliation":[{"name":"Story Brook Institute at Anhui University, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1417-5269","authenticated-orcid":false,"given":"Dengcheng","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0450-9037","authenticated-orcid":false,"given":"Qingren","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5938-5409","authenticated-orcid":false,"given":"Huabin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University, Hefei, Anhui, China"}]}],"member":"320","published-online":{"date-parts":[[2025,5,27]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Rumor detection with field of linear and non-linear propagation[C]\/\/Proceedings of the Web Conference","author":"Lao A","year":"2021","unstructured":"Lao A, Shi C, Yang Y. Rumor detection with field of linear and non-linear propagation[C]\/\/Proceedings of the Web Conference 2021. 2021: 3178-3187."},{"key":"e_1_3_3_1_2_2","first-page":"36","article-title":"When Do Graph Neural Networks Help with Node Classification? Investigating the Homophily Principle on Node Distinguishability[J]","author":"Luan S","year":"2024","unstructured":"Luan S, Hua C, Xu M, et al. When Do Graph Neural Networks Help with Node Classification? Investigating the Homophily Principle on Node Distinguishability[J]. Advances in Neural Information Processing Systems, 2024, 36.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0177-2"},{"issue":"3","key":"e_1_3_3_1_4_2","first-page":"1797","article-title":"The robustness of graph k-shell structure under adversarial attacks[J]","volume":"69","author":"Zhou B","year":"2021","unstructured":"Zhou B, Lv Y, Mao Y, et al. The robustness of graph k-shell structure under adversarial attacks[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2021, 69(3): 1797-1801.","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"issue":"1","key":"e_1_3_3_1_5_2","first-page":"82","article-title":"Adversarial attack on large scale graph[J]","volume":"35","author":"Li J","year":"2021","unstructured":"Li J, Xie T, Chen L, et al. Adversarial attack on large scale graph[J]. IEEE Transactions on Knowledge and Data Engineering, 2021, 35(1): 82-95.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_3_1_6_2","volume-title":"A restricted black-box adversarial framework towards attacking graph embedding models[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence","author":"Li J","year":"2020","unstructured":"Li J, Chang H, Rong Y, Xu T, et al. A restricted black-box adversarial framework towards attacking graph embedding models[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 2020, 34(04): 3389-3396."}],"event":{"name":"BDICN 2025: 2025 4th International Conference on Big Data, Information and Computer Network","acronym":"BDICN 2025","location":"Guangzhou China"},"container-title":["Proceedings of the 2025 4th International Conference on Big Data, Information and Computer Network"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727353.3727432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727353.3727432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:57Z","timestamp":1750298217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727353.3727432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":6,"alternative-id":["10.1145\/3727353.3727432","10.1145\/3727353"],"URL":"https:\/\/doi.org\/10.1145\/3727353.3727432","relation":{},"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"2025-05-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}