{"id":"https://openalex.org/W4396853130","doi":"https://doi.org/10.1109/jiot.2024.3400056","title":"Multiview-Ensemble-Learning-Based Robust Graph Convolutional Networks Against Adversarial Attacks","display_name":"Multiview-Ensemble-Learning-Based Robust Graph Convolutional Networks Against Adversarial Attacks","publication_year":2024,"publication_date":"2024-05-13","ids":{"openalex":"https://openalex.org/W4396853130","doi":"https://doi.org/10.1109/jiot.2024.3400056"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3400056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3400056","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064794016","display_name":"Tao Wu","orcid":"https://orcid.org/0000-0003-1751-3040"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Wu","raw_affiliation_strings":["School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"],"raw_orcid":"https://orcid.org/0000-0003-1751-3040","affiliations":[{"raw_affiliation_string":"School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109073797","display_name":"Junhui Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhui Luo","raw_affiliation_strings":["School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074090518","display_name":"Shaojie Qiao","orcid":"https://orcid.org/0000-0002-4703-780X"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaojie Qiao","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-4703-780X","affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406971","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0002-3238-0090"},"institutions":[{"id":"https://openalex.org/I126924076","display_name":"Chongqing Normal University","ror":"https://ror.org/01dcw5w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I126924076"]},{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["School of Computer and Information Science, Chongqing Normal University, Chongqing, China","Yunnan Key Laboratory of Software Engineering, Yunnan, China"],"raw_orcid":"https://orcid.org/0000-0002-3238-0090","affiliations":[{"raw_affiliation_string":"School of Computer and Information Science, Chongqing Normal University, Chongqing, China","institution_ids":["https://openalex.org/I126924076"]},{"raw_affiliation_string":"Yunnan Key Laboratory of Software Engineering, Yunnan, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101486583","display_name":"Lin Yuan","orcid":"https://orcid.org/0000-0002-8148-9770"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Yuan","raw_affiliation_strings":["School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"],"raw_orcid":"https://orcid.org/0000-0002-8148-9770","affiliations":[{"raw_affiliation_string":"School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104546388","display_name":"Xiao Pu","orcid":"https://orcid.org/0009-0005-4173-4996"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Pu","raw_affiliation_strings":["School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"],"raw_orcid":"https://orcid.org/0009-0005-4173-4996","affiliations":[{"raw_affiliation_string":"School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069415136","display_name":"Xingping Xian","orcid":"https://orcid.org/0000-0001-8166-2089"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingping Xian","raw_affiliation_strings":["School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"],"raw_orcid":"https://orcid.org/0000-0001-8166-2089","affiliations":[{"raw_affiliation_string":"School of Cybersecurity and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5064794016"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":4.3048,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.94782543,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"16","first_page":"27700","last_page":"27714"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11948","display_name":"Machine Learning in Materials Science","score":0.9426000118255615,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8488173484802246},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.654281497001648},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5244008302688599},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4984395503997803},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44781211018562317},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43488267064094543},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4289805591106415},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41056355834007263}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8488173484802246},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.654281497001648},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5244008302688599},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4984395503997803},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44781211018562317},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43488267064094543},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4289805591106415},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41056355834007263}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3400056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3400056","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1126024857","display_name":null,"funder_award_id":"62376047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1157558076","display_name":null,"funder_award_id":"62106030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W2117831564","https://openalex.org/W2590019597","https://openalex.org/W2803831897","https://openalex.org/W2892077825","https://openalex.org/W2892247084","https://openalex.org/W2899157217","https://openalex.org/W2914953695","https://openalex.org/W2949208225","https://openalex.org/W2964015378","https://openalex.org/W2964583308","https://openalex.org/W2964971928","https://openalex.org/W2984488829","https://openalex.org/W2994506732","https://openalex.org/W2994598354","https://openalex.org/W2998122931","https://openalex.org/W2998662521","https://openalex.org/W3027991306","https://openalex.org/W3039075121","https://openalex.org/W3081203761","https://openalex.org/W3082034060","https://openalex.org/W3094078906","https://openalex.org/W3098276446","https://openalex.org/W3100993589","https://openalex.org/W3104667978","https://openalex.org/W3114928288","https://openalex.org/W3165692226","https://openalex.org/W3178367256","https://openalex.org/W3210070012","https://openalex.org/W4210882709","https://openalex.org/W4221101570","https://openalex.org/W4221114735","https://openalex.org/W4226095921","https://openalex.org/W4285404754","https://openalex.org/W4297733535","https://openalex.org/W4307112907","https://openalex.org/W4307902150","https://openalex.org/W4322614756","https://openalex.org/W4388709745","https://openalex.org/W6730084236","https://openalex.org/W6738964360","https://openalex.org/W6751569023","https://openalex.org/W6755124781","https://openalex.org/W6780093097"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Graph":[0],"neural":[1],"networks":[2],"(GNNs)":[3],"have":[4,35,91],"been":[5],"widely":[6],"applied":[7],"in":[8,49,67,95,151],"the":[9,15,70,77,111,117,152,155,160,170,178,200,215],"Internet":[10],"of":[11,18,79,116,172,177],"Things":[12],"(IoT)":[13],"for":[14,102],"intelligent":[16],"analysis":[17],"data":[19],"collected":[20],"by":[21],"sensors,":[22],"particularly":[23],"complex":[24],"relationships":[25],"and":[26,60,82,130,137,159,205],"dependent":[27],"information":[28,115],"between":[29],"IoT":[30,51],"devices.":[31],"However,":[32],"recent":[33],"studies":[34],"shown":[36],"that":[37,84,199],"GNNs":[38,80,88,104],"are":[39,181],"vulnerable":[40],"to":[41,69,90,109,189],"adversarial":[42,85,106,156,173,195],"attacks,":[43],"which":[44],"significantly":[45],"limits":[46],"their":[47],"application":[48],"safety-critical":[50],"systems":[52],"such":[53],"as":[54],"smart":[55],"health":[56],"monitoring,":[57,59],"traffic":[58],"autonomous":[61],"driving.":[62],"To":[63],"address":[64],"this":[65,74,121],"issue,":[66],"addition":[68],"low":[71,92],"feature":[72,131],"similarity,":[73],"study":[75],"examines":[76],"vulnerability":[78],"empirically":[81],"reveals":[83],"perturbations":[86],"against":[87,105],"tend":[89],"structural":[93],"proximity":[94],"local":[96],"neighborhoods.":[97],"Thus,":[98],"a":[99,134,139],"natural":[100],"approach":[101],"defending":[103],"attacks":[107],"is":[108,221],"utilize":[110],"related":[112],"high-order":[113,128],"robust":[114,143],"perturbed":[118,135,157],"graphs.":[119],"In":[120],"study,":[122],"we":[123],"construct":[124],"auxiliary":[125],"views":[126],"with":[127],"structure":[129],"similarity":[132],"from":[133],"graph":[136,144,158,217],"propose":[138],"multi-view":[140],"ensemble":[141,187],"learning-based":[142],"convolutional":[145],"network":[146],"(MV-RGCN).":[147],"Each":[148],"base":[149,179],"model":[150],"MV-RGCN":[153,201],"aggregates":[154],"constructed":[161],"view":[162],"through":[163],"an":[164,185],"adaptive":[165,186],"aggregation":[166],"mechanism,":[167],"thereby":[168],"eliminating":[169],"impact":[171],"perturbations.":[174],"Robust":[175],"representations":[176],"models":[180],"then":[182],"integrated":[183],"using":[184],"mechanism":[188],"generate":[190],"predictions.":[191],"Extensive":[192],"experiments":[193],"under":[194],"attack":[196],"scenarios":[197],"demonstrate":[198],"outperforms":[202],"state-of-the-art":[203],"methods":[204],"can":[206],"achieve":[207],"satisfactory":[208],"performance":[209],"without":[210],"affecting":[211],"its":[212],"accuracy":[213],"on":[214],"original":[216],"data.":[218],"This":[219],"code":[220],"available":[222],"at":[223],"https://github.com/thomaslok0516/MVRGCN.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
