{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:50:27Z","timestamp":1769737827198,"version":"3.49.0"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972025"],"award-info":[{"award-number":["61972025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802389"],"award-info":[{"award-number":["61802389"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672092"],"award-info":[{"award-number":["61672092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1811264"],"award-info":[{"award-number":["U1811264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61966009"],"award-info":[{"award-number":["61966009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020YFB1005604"],"award-info":[{"award-number":["2020YFB1005604"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020YFB2103800"],"award-info":[{"award-number":["2020YFB2103800"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018JBZ103"],"award-info":[{"award-number":["2018JBZ103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019RC008"],"award-info":[{"award-number":["2019RC008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["KX201902"],"award-info":[{"award-number":["KX201902"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["61972025"],"award-info":[{"award-number":["61972025"]}]},{"name":"National Key R&D Program of China","award":["61802389"],"award-info":[{"award-number":["61802389"]}]},{"name":"National Key R&D Program of China","award":["61672092"],"award-info":[{"award-number":["61672092"]}]},{"name":"National Key R&D Program of China","award":["U1811264"],"award-info":[{"award-number":["U1811264"]}]},{"name":"National Key R&D Program of China","award":["61966009"],"award-info":[{"award-number":["61966009"]}]},{"name":"National Key R&D Program of China","award":["2020YFB1005604"],"award-info":[{"award-number":["2020YFB1005604"]}]},{"name":"National Key R&D Program of China","award":["2020YFB2103800"],"award-info":[{"award-number":["2020YFB2103800"]}]},{"name":"National Key R&D Program of China","award":["2018JBZ103"],"award-info":[{"award-number":["2018JBZ103"]}]},{"name":"National Key R&D Program of China","award":["2019RC008"],"award-info":[{"award-number":["2019RC008"]}]},{"name":"National Key R&D Program of China","award":["KX201902"],"award-info":[{"award-number":["KX201902"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61972025"],"award-info":[{"award-number":["61972025"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61802389"],"award-info":[{"award-number":["61802389"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61672092"],"award-info":[{"award-number":["61672092"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["U1811264"],"award-info":[{"award-number":["U1811264"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61966009"],"award-info":[{"award-number":["61966009"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020YFB1005604"],"award-info":[{"award-number":["2020YFB1005604"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020YFB2103800"],"award-info":[{"award-number":["2020YFB2103800"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2018JBZ103"],"award-info":[{"award-number":["2018JBZ103"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019RC008"],"award-info":[{"award-number":["2019RC008"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["KX201902"],"award-info":[{"award-number":["KX201902"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["61972025"],"award-info":[{"award-number":["61972025"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["61802389"],"award-info":[{"award-number":["61802389"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["61672092"],"award-info":[{"award-number":["61672092"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["U1811264"],"award-info":[{"award-number":["U1811264"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["61966009"],"award-info":[{"award-number":["61966009"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["2020YFB1005604"],"award-info":[{"award-number":["2020YFB1005604"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["2020YFB2103800"],"award-info":[{"award-number":["2020YFB2103800"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["2018JBZ103"],"award-info":[{"award-number":["2018JBZ103"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["2019RC008"],"award-info":[{"award-number":["2019RC008"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["KX201902"],"award-info":[{"award-number":["KX201902"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,3,9]]},"abstract":"<jats:p>Socialnet becomes an important component in real life, drawing a lot of study issues of security and safety. Recently, for the features of graph structure in socialnet, adversarial attacks on node classification are exposed, and automatic attack methods such as fast gradient attack (FGA) and NETTACK are developed for per-node attacks, which can be utilized for multinode attacks in a sequential way. However, due to the overlook of perturbation influence between different per-node attacks, the above sequential method does not guarantee a global attack success rate for all target nodes, under a fixed budget of perturbation. In this paper, we propose a parallel adversarial attack framework on node classification. We redesign new loss function and objective function for nonconstraint and constraint perturbations, respectively. Through constructing intersection and supplement mechanisms of perturbations, we then integrate node filtering-based P-FGA and P-NETTACK in a unified framework, finally realizing parallel adversarial attacks. Experiments on politician socialnet dataset Polblogs with detailed analysis are conducted to show the effectiveness of our approach.<\/jats:p>","DOI":"10.1155\/2021\/6631247","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T22:05:31Z","timestamp":1615327531000},"page":"1-13","source":"Crossref","is-referenced-by-count":1,"title":["Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0015-7780","authenticated-orcid":true,"given":"Yunzhe","family":"Tian","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1147-4327","authenticated-orcid":true,"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0348-2108","authenticated-orcid":true,"given":"Endong","family":"Tong","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4706-4266","authenticated-orcid":true,"given":"Wenjia","family":"Niu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7262-4707","authenticated-orcid":true,"given":"Liang","family":"Chang","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0316-9285","authenticated-orcid":true,"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1583-641X","authenticated-orcid":true,"given":"Gang","family":"Li","sequence":"additional","affiliation":[{"name":"Australia Centre for Cyber Security Research and Innovation, Deakin University, Geelong, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5974-1589","authenticated-orcid":true,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1080\/10570319909374648"},{"issue":"1","key":"2","first-page":"25","article-title":"MobiShare+: security improved system for location sharing in mobile online social networks","volume":"4","author":"J. Li","year":"2014","journal-title":"Journal of Internet Services and Information Security"},{"issue":"3","key":"3","first-page":"1","article-title":"Determination of young generation\u2019s sensitivity to the destructive stimuli based on the information in social networks","volume":"9","author":"A. Branitskiy","year":"2019","journal-title":"Journal of Internet Services and Information Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2012.12.001"},{"issue":"4","key":"5","first-page":"109","article-title":"Reference architecture for social networks graph analysis tool","volume":"10","author":"M. Kolomeets","year":"2019","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"2","key":"6","first-page":"55","article-title":"Social networks analysis by graph algorithms on the example of the VKontakte social network","volume":"10","author":"M. Kolomeets","year":"2019","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.06.008"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.014"},{"key":"9","article-title":"Nodenet: a graph regularised neural network for node classification","author":"S. Dabhi","year":"2020"},{"key":"10","article-title":"Semi-supervised classification with graph convolutional networks","author":"T. N. Kipf","year":"2016"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-019-0069-y"},{"issue":"1","key":"12","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","article-title":"The graph neural network model","volume":"20","author":"F. Scarselli","year":"2008","journal-title":"IEEE Transactions on Neural Networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"14","first-page":"1656","article-title":"Certifiable robustness of graph convolutional networks under structure perturbations","author":"D. Z\u00fcgner"},{"key":"15","article-title":"Adversarial attack and defense on graph data: a survey","author":"L. Sun","year":"2018"},{"key":"16","article-title":"Fast gradient attack on network embedding","author":"J. Chen","year":"2018"},{"key":"17","first-page":"2847","article-title":"Adversarial attacks on neural networks for graph data","author":"D. Z\u00fcgner"},{"key":"18","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"N. Carlini"},{"key":"19","first-page":"36","article-title":"The political blogosphere and the 2004 US election: divided they blog","author":"L. A. Adamic"},{"key":"20","first-page":"47","article-title":"Efficient bayesian hierarchical user modeling for recommendation system","author":"Y. Zhang"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"22","article-title":"Two samples test for discrete power-law distributions","author":"A. Bessi","year":"2015"},{"key":"23","article-title":"Adam: a method for stochastic optimization","author":"D. P. Kingma","year":"2014"},{"key":"24","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"X. Glorot"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715612822"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-012-0079-3"},{"key":"27","article-title":"Adversarial attack on graph structured data","author":"H. Dai","year":"2018"},{"key":"28","first-page":"1024","article-title":"Inductive representation learning on large graphs","author":"W. Hamilton"},{"key":"29","article-title":"Towards data poisoning attack against knowledge graph embedding","author":"H. Zhang","year":"2019"},{"key":"30","first-page":"2787","article-title":"Translating embeddings for modeling multi-relational data","author":"A. Bordes"},{"key":"31","first-page":"809","article-title":"A three-way model for collective learning on multi-relational data","volume":"11","author":"M. Nickel","year":"2011","journal-title":"ICML"},{"issue":"1","key":"32","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TKDE.2016.2606098","article-title":"A semi-NMF-PCA unified framework for data clustering","volume":"29","author":"K. Allab","year":"2016","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"33","first-page":"976","article-title":"Adaptive graph encoder for attributed graph embedding","author":"G. Cui"},{"key":"34","article-title":"Adversarial examples on graph data: deep insights into attack and defense","author":"H. Wu","year":"2019"},{"key":"35","first-page":"1563","article-title":"Meta-learning on heterogeneous information networks for cold-start recommendation","author":"Y. Lu"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6631247.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6631247.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6631247.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T22:05:47Z","timestamp":1615327547000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6631247\/"}},"subtitle":[],"editor":[{"given":"Zhe-Li","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,3,9]]},"references-count":35,"alternative-id":["6631247","6631247"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6631247","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3,9]]}}}