{"id":"https://openalex.org/W3175511223","doi":"https://doi.org/10.1145/3488560.3498497","title":"Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem","display_name":"Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem","publication_year":2022,"publication_date":"2022-02-11","ids":{"openalex":"https://openalex.org/W3175511223","doi":"https://doi.org/10.1145/3488560.3498497","mag":"3175511223"},"language":"en","primary_location":{"id":"doi:10.1145/3488560.3498497","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488560.3498497","pdf_url":null,"source":{"id":"https://openalex.org/S4363608885","display_name":"Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089063294","display_name":"Jiaqi Ma","orcid":"https://orcid.org/0000-0001-8292-5901"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiaqi Ma","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054337132","display_name":"Junwei Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junwei Deng","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048955398","display_name":"Qiaozhu Mei","orcid":"https://orcid.org/0000-0002-8640-1942"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiaozhu Mei","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089063294"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":2.8349,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.92171931,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"675","last_page":"685"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11948","display_name":"Machine Learning in Materials Science","score":0.9578999876976013,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8824076652526855},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7687762379646301},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.7216753959655762},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6212757229804993},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5263194441795349},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.46642547845840454},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45969927310943604},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4316822290420532},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.41754746437072754},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33658933639526367},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32320672273635864},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.2860116958618164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26573270559310913},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09768664836883545}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8824076652526855},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7687762379646301},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.7216753959655762},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6212757229804993},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5263194441795349},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.46642547845840454},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45969927310943604},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4316822290420532},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.41754746437072754},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33658933639526367},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32320672273635864},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2860116958618164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26573270559310913},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09768664836883545},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3488560.3498497","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488560.3498497","pdf_url":null,"source":{"id":"https://openalex.org/S4363608885","display_name":"Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5943365711","display_name":null,"funder_award_id":"1633370","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W318698866","https://openalex.org/W569478347","https://openalex.org/W1899249567","https://openalex.org/W2003827431","https://openalex.org/W2041157860","https://openalex.org/W2061820396","https://openalex.org/W2102907934","https://openalex.org/W2144933361","https://openalex.org/W2153959628","https://openalex.org/W2519887557","https://openalex.org/W2551441958","https://openalex.org/W2624431344","https://openalex.org/W2746600820","https://openalex.org/W2803678876","https://openalex.org/W2803831897","https://openalex.org/W2804057010","https://openalex.org/W2807021761","https://openalex.org/W2907492528","https://openalex.org/W2908442265","https://openalex.org/W2914721378","https://openalex.org/W2914953695","https://openalex.org/W2945796017","https://openalex.org/W2946297661","https://openalex.org/W2949854114","https://openalex.org/W2962767366","https://openalex.org/W2963446085","https://openalex.org/W2963858333","https://openalex.org/W2964583308","https://openalex.org/W2972798399","https://openalex.org/W2997404190","https://openalex.org/W2998122931","https://openalex.org/W3007913141","https://openalex.org/W3027206931","https://openalex.org/W3098276446","https://openalex.org/W3100848837","https://openalex.org/W3103720336","https://openalex.org/W3104371494","https://openalex.org/W3106412272","https://openalex.org/W3111218397","https://openalex.org/W4210257598","https://openalex.org/W4212774754"],"related_works":["https://openalex.org/W4307079546","https://openalex.org/W4283317927","https://openalex.org/W3102631191","https://openalex.org/W4293790771","https://openalex.org/W4387995186","https://openalex.org/W2897971651","https://openalex.org/W3155916161","https://openalex.org/W4320024171","https://openalex.org/W2502907510","https://openalex.org/W3036725378"],"abstract_inverted_index":{"Graph":[0],"neural":[1],"networks":[2],"(GNNs)":[3],"have":[4],"attracted":[5],"increasing":[6],"interests.":[7],"With":[8],"broad":[9],"deployments":[10],"of":[11,25,41,54,58,78,98,111,129],"GNNs":[12,26,43],"in":[13,31,44],"real-world":[14],"applications,":[15],"there":[16],"is":[17],"an":[18,81],"urgent":[19],"need":[20],"for":[21],"understanding":[22,94],"the":[23,39,52,86,96,121,127],"robustness":[24],"under":[27],"adversarial":[28,99,137],"attacks,":[29],"especially":[30],"realistic":[32,48],"setups.":[33],"In":[34],"this":[35,76],"work,":[36],"we":[37],"study":[38],"problem":[40,84,97],"attacking":[42],"a":[45,55,73,109],"restricted":[46],"and":[47,66,80,113,134],"setup,":[49],"by":[50],"perturbing":[51],"features":[53],"small":[56],"set":[57],"nodes,":[59],"with":[60],"no":[61],"access":[62],"to":[63,107],"model":[64,67],"parameters":[65],"predictions.":[68],"Our":[69,117],"formal":[70],"analysis":[71],"draws":[72],"connection":[74,89],"between":[75],"type":[77],"attacks":[79],"influence":[82],"maximization":[83],"on":[85,95,101],"graph.":[87],"This":[88],"not":[90],"only":[91],"enhances":[92],"our":[93],"attack":[100,115,123,138],"GNNs,":[102],"but":[103],"also":[104],"allows":[105],"us":[106],"propose":[108],"group":[110],"effective":[112],"practical":[114],"strategies.":[116,139],"experiments":[118],"verify":[119],"that":[120],"proposed":[122],"strategies":[124],"significantly":[125],"degrade":[126],"performance":[128],"three":[130],"popular":[131],"GNN":[132],"models":[133],"outperform":[135],"baseline":[136]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
