{"id":"https://openalex.org/W7125931860","doi":"https://doi.org/10.1109/smc58881.2025.11343688","title":"A Distributed Adaptive System with Strong Tie Graphs for Trust-Aware Reasoning in Adversarial Graphs","display_name":"A Distributed Adaptive System with Strong Tie Graphs for Trust-Aware Reasoning in Adversarial Graphs","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125931860","doi":"https://doi.org/10.1109/smc58881.2025.11343688"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343688","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343688","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109510320","display_name":"Yu Bu","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yu Bu","raw_affiliation_strings":["The Hong Kong Polytechnic University,Dept. of Computing"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University,Dept. of Computing","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124101371","display_name":"Yulin Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I178968375","display_name":"Hong Kong Chu Hai College","ror":"https://ror.org/021a2zz52","country_code":"HK","type":"education","lineage":["https://openalex.org/I178968375"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yulin Zhu","raw_affiliation_strings":["Hong Kong Chu Hai College,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"Hong Kong Chu Hai College,Department of Computer Science","institution_ids":["https://openalex.org/I178968375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124099286","display_name":"Yuni Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I178968375","display_name":"Hong Kong Chu Hai College","ror":"https://ror.org/021a2zz52","country_code":"HK","type":"education","lineage":["https://openalex.org/I178968375"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yuni Lai","raw_affiliation_strings":["Hong Kong Chu Hai College,Department of Computer Science"],"affiliations":[{"raw_affiliation_string":"Hong Kong Chu Hai College,Department of Computer Science","institution_ids":["https://openalex.org/I178968375"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109510320"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87189424,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4756","last_page":"4763"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.7950999736785889,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.7950999736785889,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.02810000069439411,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.01860000006854534,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8485000133514404},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6611999869346619},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6144000291824341},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6105999946594238},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5095999836921692},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.4875999987125397},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.39419999718666077},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.3765999972820282}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8485000133514404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7495999932289124},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6611999869346619},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6144000291824341},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6105999946594238},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5095999836921692},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.4875999987125397},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48579999804496765},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47510001063346863},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.3765999972820282},{"id":"https://openalex.org/C146380142","wikidata":"https://www.wikidata.org/wiki/Q1137726","display_name":"Directed graph","level":2,"score":0.364300012588501},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.3531000018119812},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.3264000117778778},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.31529998779296875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3066999912261963},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.2973000109195709},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26269999146461487},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C187407849","wikidata":"https://www.wikidata.org/wiki/Q6889712","display_name":"Modular decomposition","level":5,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343688","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343688","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1492230849","https://openalex.org/W1846209353","https://openalex.org/W1988578917","https://openalex.org/W2604175478","https://openalex.org/W2803831897","https://openalex.org/W2892160417","https://openalex.org/W2951823788","https://openalex.org/W2964583308","https://openalex.org/W2998122931","https://openalex.org/W3046435230","https://openalex.org/W3081203761","https://openalex.org/W3174908416","https://openalex.org/W3181414820","https://openalex.org/W4283811662","https://openalex.org/W4312403340","https://openalex.org/W4312996082","https://openalex.org/W4392902906","https://openalex.org/W4403004898"],"related_works":[],"abstract_inverted_index":{"This":[0],"study":[1],"proposes":[2],"a":[3,34,85,147],"distributed":[4,149],"adaptive":[5,152],"system":[6,82],"for":[7],"robust":[8],"reasoning":[9],"over":[10],"graph-structured":[11],"data":[12,156],"under":[13,128],"structural":[14,92],"poisoning":[15],"attacks,":[16],"where":[17],"adversaries":[18],"strategically":[19],"manipulate":[20],"edges":[21],"to":[22,72,99,110],"compromise":[23],"predictive":[24],"integrity.":[25],"We":[26],"introduce":[27],"the":[28,44,107],"Graph":[29],"Adaptive":[30],"Neural":[31],"Network":[32],"(GANN),":[33],"modular":[35],"framework":[36,123],"that":[37],"treats":[38],"trust":[39,95],"and":[40,68,77,94,137,158],"risk":[41],"zones":[42],"within":[43],"graph":[45,139],"as":[46,84,146],"semi-autonomous":[47],"components":[48],"capable":[49],"of":[50],"self-regulating":[51],"their":[52],"propagation":[53],"behaviors":[54],"based":[55],"on":[56],"adversarial":[57,130,159],"feedback.":[58],"Leveraging":[59],"fuzzy-theoretic":[60],"Strong":[61],"Tie":[62],"Graphs":[63],"(STiG),":[64],"GANN":[65],"adaptively":[66],"identifies":[67],"reinforces":[69],"high-confidence":[70],"regions":[71],"ensure":[73],"resilient":[74],"node":[75],"classification":[76],"secure":[78],"query":[79,160],"handling.":[80],"The":[81],"operates":[83],"surrogate":[86],"defense":[87],"layer,":[88],"dynamically":[89],"managing":[90],"zone-based":[91],"decomposition":[93],"calibration":[96],"in":[97,135,154],"response":[98],"perturbations.":[100],"Its":[101],"selective":[102],"validation-driven":[103],"adaptation":[104],"mechanism":[105],"restricts":[106],"attacker\u2019s":[108],"ability":[109],"exploit":[111],"unlabeled":[112],"data,":[113],"forcing":[114],"them":[115],"toward":[116],"costly":[117],"global":[118],"strategies.":[119],"A":[120],"confidence-based":[121],"regulation":[122],"further":[124],"enhances":[125],"GANN\u2019s":[126,144],"robustness":[127],"bounded":[129],"budgets,":[131],"with":[132],"demonstrated":[133],"effectiveness":[134],"non-IID":[136],"directed":[138],"settings.":[140],"Experimental":[141],"results":[142],"validate":[143],"capability":[145],"self-adjusting":[148],"system,":[150],"advancing":[151],"defenses":[153],"graph-based":[155],"management":[157],"environments.":[161]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
