{"id":"https://openalex.org/W7140273810","doi":"https://doi.org/10.1109/tce.2025.3649554","title":"RobuGCL: Stability-Aware Graph Contrastive Learning Against AI-Enabled Attacks in Consumer Electronics","display_name":"RobuGCL: Stability-Aware Graph Contrastive Learning Against AI-Enabled Attacks in Consumer Electronics","publication_year":2026,"publication_date":"2026-02-01","ids":{"openalex":"https://openalex.org/W7140273810","doi":"https://doi.org/10.1109/tce.2025.3649554"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3649554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3649554","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130612600","display_name":"Adnan Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Adnan Ali","raw_affiliation_strings":["School of Computer Science and Technology, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130610666","display_name":"Jinlong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinlong Li","raw_affiliation_strings":["School of Computer Science and Technology, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125365899","display_name":"Farooq Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Farooq Ahmed","raw_affiliation_strings":["School of Cyberspace Security and the School of Cryptology, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security and the School of Cryptology, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111201172","display_name":"Hao Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Xie","raw_affiliation_strings":["School of Cyberspace Security and the School of Cryptology, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security and the School of Cryptology, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076963414","display_name":"Rayan Hamza Alsisi","orcid":"https://orcid.org/0000-0003-3448-9425"},"institutions":[{"id":"https://openalex.org/I4210151290","display_name":"Islamic University of Madinah","ror":"https://ror.org/03rcp1y74","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210151290"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Rayan Hamza Alsisi","raw_affiliation_strings":["Department of Electrical Engineering, Islamic University of Madinah, Madinah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Islamic University of Madinah, Madinah, Saudi Arabia","institution_ids":["https://openalex.org/I4210151290"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5130612600"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.91023845,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1532","last_page":"1543"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.5335000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.5335000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.3474000096321106,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.019200000911951065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/contrastive-analysis","display_name":"Contrastive analysis","score":0.41690000891685486},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.38269999623298645},{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.36880001425743103},{"id":"https://openalex.org/keywords/natural-language","display_name":"Natural language","score":0.3634999990463257},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.29490000009536743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6798999905586243},{"id":"https://openalex.org/C2777629044","wikidata":"https://www.wikidata.org/wiki/Q614959","display_name":"Contrastive analysis","level":2,"score":0.41690000891685486},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.38269999623298645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3806000053882599},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.36880001425743103},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.3634999990463257},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3294999897480011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31029999256134033},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.29750001430511475},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.29490000009536743},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2822999954223633},{"id":"https://openalex.org/C195358072","wikidata":"https://www.wikidata.org/wiki/Q944584","display_name":"Telephony","level":2,"score":0.26589998602867126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3649554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3649554","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W3095746859","https://openalex.org/W3124962940","https://openalex.org/W3188982020","https://openalex.org/W4206282044","https://openalex.org/W4221139060","https://openalex.org/W4283796586","https://openalex.org/W4290878031","https://openalex.org/W4290945688","https://openalex.org/W4294068600","https://openalex.org/W4295934584","https://openalex.org/W4317987615","https://openalex.org/W4367047175","https://openalex.org/W4372037325","https://openalex.org/W4379382628","https://openalex.org/W4384161790","https://openalex.org/W4385565641","https://openalex.org/W4385567536","https://openalex.org/W4386920561","https://openalex.org/W4388562580","https://openalex.org/W4388914562","https://openalex.org/W4390659989","https://openalex.org/W4391164276","https://openalex.org/W4391853848","https://openalex.org/W4394585823","https://openalex.org/W4405022935","https://openalex.org/W4406070218","https://openalex.org/W4409363958","https://openalex.org/W4410582135","https://openalex.org/W4411143356","https://openalex.org/W4412375011","https://openalex.org/W4413392360"],"related_works":[],"abstract_inverted_index":{"Graph":[0],"contrastive":[1,136,144],"learning":[2,11,286],"(GCL)":[3],"is":[4,185,272],"a":[5,55,72,91,102,127],"powerful":[6],"paradigm":[7],"for":[8,59,191,261,287],"self-supervised":[9],"representation":[10,285],"on":[12,29,164,174,182,210,222,256],"consumer":[13],"electronics":[14],"(CE)":[15],"graphs.":[16],"Conventional":[17],"GCL":[18],"lacks":[19],"<italic":[20,30,43,52,73,103,203,233],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[21,31,44,53,74,104,172,204,220,234,243,248,264],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">temporal,":[22],"multi-channel</i>":[23],"adversary":[24],"modeling":[25],"and":[26,42,46,63,86,97,100,115,177,279,294],"typically":[27],"relies":[28],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">uniform,":[32],"all-node</i>":[33],"negatives,":[34],"making":[35],"it":[36],"fragile":[37],"under":[38,126],"CE":[39,60,288],"adversarial":[40,180,189],"conditions":[41],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">memory-":[45],"latency-intensive</i>":[47],"on-device":[48],"budgets.":[49],"We":[50,161],"propose":[51],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">RobuGCL</i>,":[54],"stability-aware":[56],"framework":[57],"designed":[58],"memory,":[61],"compute,":[62],"latency":[64],"constraints.":[65],"RobuGCL":[66,163,245,281],"integrates":[67],"two":[68],"co-designed":[69],"components:":[70],"(i)":[71],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Temporal":[75],"Adversarial":[76],"Contrastive":[77],"Attack</i>":[78],"(TACA),":[79],"which":[80,109],"periodically":[81],"applies":[82],"worst-case":[83,135],"structure,":[84],"feature,":[85],"projection":[87],"perturbations":[88],"together":[89],"with":[90,224],"stability":[92],"regularizer":[93],"to":[94,146,149,158,195,227],"align":[95],"clean":[96],"perturbed":[98],"embeddings;":[99],"(ii)":[101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">budgeted,":[105],"adaptive":[106],"negative":[107],"sampler</i>,":[108],"partitions":[110],"negatives":[111],"into":[112],"easy/medium/hard":[113],"pools":[114],"expands":[116],"the":[117,122,134,143,168,178,188,196,202],"sampled":[118],"set":[119],"only":[120],"when":[121,217],"training":[123],"loss":[124],"plateaus,":[125],"strict":[128],"50%":[129],"global":[130],"cap,":[131],"effectively":[132],"halving":[133],"denominator":[137],"versus":[138],"all-negatives.":[139],"This":[140],"design":[141],"allows":[142],"objective":[145],"respond":[147],"dynamically":[148],"attack-induced":[150],"distribution":[151],"shifts":[152],"while":[153,266],"bounding":[154],"peak":[155],"memory":[156],"compared":[157],"all-negatives":[159],"baselines.":[160],"evaluate":[162],"nine":[165,176],"public":[166],"benchmarks:":[167],"clean-training":[169],"variant":[170],"(RobuGCL<sub":[171],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">c</sub>)":[173],"all":[175],"full":[179],"model":[181],"eight":[183],"(DBLP":[184],"excluded":[186],"during":[187],"pass":[190],"GPU":[192],"memory).":[193],"Relative":[194],"strongest":[197],"published":[198],"baseline":[199],"per":[200],"dataset,":[201],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">full":[205],"RobuGCL</i>":[206],"achieves":[207],"state-of-the-art":[208],"micro-F1":[209],"7/8":[211],"adversarially":[212],"trained":[213],"datasets":[214,260],"(and":[215],"8/9":[216],"including":[218],"RobuGCL<sub":[219],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">c</sub>":[221],"DBLP),":[223],"gains":[225],"up":[226],"+":[228,270],"2.40":[229],"percentage":[230],"points.":[231],"Under":[232],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">unseen</i>":[235],"attacks":[236],"at":[237],"35%":[238],"budget":[239],"(RANDOM,":[240],"DICE,":[241],"DICE<sub":[242,263],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">d</sub>),":[244],"incurs":[246],"<inline-formula":[247],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[249],"<tex-math":[250],"notation=\"LaTeX\">$\\le":[251],"$":[252],"</tex-math></inline-formula>1.0%":[253],"relative":[254],"F1-Drop":[255],"five":[257],"of":[258],"six":[259],"deletion-only":[262],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">d</sub>,":[265],"mixed":[267],"DICE":[268],"(additions":[269],"deletions)":[271],"more":[273],"disruptive.":[274],"By":[275],"jointly":[276],"addressing":[277],"robustness":[278],"efficiency,":[280],"advances":[282],"practical":[283],"graph":[284],"applications":[289],"such":[290],"as":[291],"recommendation,":[292],"personalization,":[293],"IoT":[295],"analytics.":[296]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-26T00:00:00"}
