{"id":"https://openalex.org/W3112788077","doi":"https://doi.org/10.1145/3427228.3427245","title":"Attacking Graph-Based Classification without Changing Existing Connections","display_name":"Attacking Graph-Based Classification without Changing Existing Connections","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3112788077","doi":"https://doi.org/10.1145/3427228.3427245","mag":"3112788077"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427245","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427245","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055156646","display_name":"Xuening Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xuening Xu","raw_affiliation_strings":["Temple University, United States of America"],"affiliations":[{"raw_affiliation_string":"Temple University, United States of America","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I2801004183","display_name":"Temple College","ror":"https://ror.org/038s1ax16","country_code":"US","type":"education","lineage":["https://openalex.org/I2801004183"]},{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Temple University"],"affiliations":[{"raw_affiliation_string":"Temple University","institution_ids":["https://openalex.org/I2801004183","https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102018601","display_name":"Qiang Zeng","orcid":"https://orcid.org/0000-0001-9432-6017"},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiang Zeng","raw_affiliation_strings":["University of South Carolina"],"affiliations":[{"raw_affiliation_string":"University of South Carolina","institution_ids":["https://openalex.org/I155781252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055156646"],"corresponding_institution_ids":["https://openalex.org/I84392919"],"apc_list":null,"apc_paid":null,"fwci":0.7722,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76546889,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"951","last_page":"962"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8301399350166321},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6891045570373535},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5664310455322266},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4974696934223175},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4782389998435974},{"id":"https://openalex.org/keywords/adjacency-list","display_name":"Adjacency list","score":0.473514586687088},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.44771260023117065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44026902318000793},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42307600378990173},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4104096293449402},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3679216504096985},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34290969371795654},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.2236258089542389},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20310178399085999},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08834895491600037}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8301399350166321},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6891045570373535},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5664310455322266},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4974696934223175},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4782389998435974},{"id":"https://openalex.org/C110484373","wikidata":"https://www.wikidata.org/wiki/Q264398","display_name":"Adjacency list","level":2,"score":0.473514586687088},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.44771260023117065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44026902318000793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42307600378990173},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4104096293449402},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3679216504096985},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34290969371795654},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2236258089542389},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20310178399085999},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08834895491600037},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427245","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427245","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5227803616","display_name":null,"funder_award_id":"CNS-1828363,CNS-1564128,CNS-1824440,CNS-2016589,CNS-1856380,CNS-2016415","funder_id":"https://openalex.org/F4320322898","funder_display_name":"Shota Rustaveli National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322898","display_name":"Shota Rustaveli National Science Foundation","ror":"https://ror.org/00xc87681"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W131956760","https://openalex.org/W1888005072","https://openalex.org/W1989643196","https://openalex.org/W2016707451","https://openalex.org/W2049092543","https://openalex.org/W2059733647","https://openalex.org/W2090212887","https://openalex.org/W2090891622","https://openalex.org/W2112796928","https://openalex.org/W2116341502","https://openalex.org/W2142772221","https://openalex.org/W2148123869","https://openalex.org/W2154851992","https://openalex.org/W2163898372","https://openalex.org/W2166128942","https://openalex.org/W2168508162","https://openalex.org/W2242161203","https://openalex.org/W2482374127","https://openalex.org/W2504108613","https://openalex.org/W2604258491","https://openalex.org/W2604776663","https://openalex.org/W2751074899","https://openalex.org/W2752586018","https://openalex.org/W2755088640","https://openalex.org/W2764040154","https://openalex.org/W2768104274","https://openalex.org/W2771677725","https://openalex.org/W2774688517","https://openalex.org/W2803831897","https://openalex.org/W2894175828","https://openalex.org/W2914953695","https://openalex.org/W2950577311","https://openalex.org/W2962756421","https://openalex.org/W2962960408","https://openalex.org/W2963021929","https://openalex.org/W2963539945","https://openalex.org/W2964390258","https://openalex.org/W2966149470","https://openalex.org/W2969908034","https://openalex.org/W2971716133","https://openalex.org/W2973021304","https://openalex.org/W2984488829","https://openalex.org/W3098276446","https://openalex.org/W3099608705","https://openalex.org/W3104097132","https://openalex.org/W3105705953"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W2900798793","https://openalex.org/W2735598854","https://openalex.org/W2784233313","https://openalex.org/W4245709619","https://openalex.org/W4390437572"],"abstract_inverted_index":{"In":[0,117],"recent":[1],"years,":[2],"with":[3],"the":[4,92,103,110,144,172,179,204,218,223,245,250],"rapid":[5],"development":[6],"of":[7,69,74,194,222],"machine":[8,20,34],"learning":[9,21,35],"in":[10,88,150],"various":[11],"domains,":[12],"more":[13,15,139],"and":[14,42,141,164,186,233,249],"studies":[16],"have":[17,51,77],"shown":[18,52],"that":[19,53,109,203],"models":[22],"are":[23],"vulnerable":[24],"to":[25,64,84,99,159,167,191,237],"adversarial":[26,33],"attacks.":[27,116],"However,":[28],"most":[29,221],"existing":[30,70,134,168,175],"researches":[31],"on":[32,48,125],"study":[36],"non-graph":[37],"data,":[38],"such":[39,86,115],"as":[40,182],"images":[41],"text.":[43],"Though":[44],"some":[45,161],"previous":[46],"works":[47],"graph":[49],"data":[50],"adversaries":[54],"can":[55,112,206,234],"make":[56,209,217],"graph-based":[57],"classification":[58,127],"methods":[59,128],"unreliable":[60],"by":[61,129],"adding":[62,130],"perturbations":[63],"features":[65],"or":[66],"adjacency":[67],"matrices":[68],"nodes,":[71],"these":[72],"kinds":[73],"attacks":[75,87],"sometimes":[76],"limitations":[78],"for":[79,243],"real-world":[80],"applications.":[81],"For":[82,148],"example,":[83],"launch":[85,114],"real":[89,152],"social":[90,153],"networks,":[91],"attacker":[93,111,156],"cannot":[94],"force":[95],"two":[96],"good":[97],"users":[98,169],"change":[100],"(e.g.,":[101],"remove)":[102],"connection":[104],"between":[105],"them,":[106],"which":[107],"means":[108],"not":[113,207],"this":[118],"paper,":[119],"we":[120],"propose":[121],"a":[122,151,188],"novel":[123],"attack":[124,137,145,181,205,229],"collective":[126],"fake":[131,162,197,211],"nodes":[132,212],"into":[133],"graphs.":[135],"Our":[136,199],"is":[138,230],"realistic":[140],"practical":[142],"than":[143],"mentioned":[146],"above.":[147],"instance,":[149],"network,":[154],"an":[155,183],"only":[157,208],"needs":[158],"create":[160],"accounts":[163],"connect":[165],"them":[166],"without":[170],"modifying":[171],"connections":[173],"among":[174],"users.":[176],"We":[177],"formulate":[178],"new":[180,210,228,246],"optimization":[184],"problem":[185],"utilize":[187],"gradient-based":[189],"method":[190],"generate":[192],"edges":[193],"newly":[195],"added":[196],"nodes.":[198,225],"extensive":[200],"experiments":[201],"show":[202],"evade":[213],"detection,":[214],"but":[215],"also":[216],"detector":[219],"misclassify":[220],"target":[224,251],"The":[226],"proposed":[227],"very":[231],"effective":[232],"achieve":[235],"up":[236],"100%":[238],"False":[239],"Negative":[240],"Rates":[241],"(FNRs)":[242],"both":[244],"node":[247,252],"set":[248],"set.":[253]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
