{"id":"https://openalex.org/W4403582424","doi":"https://doi.org/10.1145/3627673.3679905","title":"Effective Clean-Label Backdoor Attacks on Graph Neural Networks","display_name":"Effective Clean-Label Backdoor Attacks on Graph Neural Networks","publication_year":2024,"publication_date":"2024-10-20","ids":{"openalex":"https://openalex.org/W4403582424","doi":"https://doi.org/10.1145/3627673.3679905"},"language":"en","primary_location":{"id":"doi:10.1145/3627673.3679905","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627673.3679905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103874170","display_name":"Xuanhao Fan","orcid":"https://orcid.org/0009-0003-2968-4178"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xuanhao Fan","raw_affiliation_strings":["Independent, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Independent, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091395218","display_name":"Enyan Dai","orcid":"https://orcid.org/0000-0001-9715-0280"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Enyan Dai","raw_affiliation_strings":["The Pennsylvania State University &amp; HKUST(GZ), State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University &amp; HKUST(GZ), State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103874170"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3415,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67342664,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"3752","last_page":"3756"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10211","display_name":"Computational Drug Discovery Methods","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8958598375320435},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6568564176559448},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.466326504945755},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42723894119262695},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3426654040813446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28363722562789917},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2588878870010376}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8958598375320435},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6568564176559448},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.466326504945755},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42723894119262695},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3426654040813446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28363722562789917},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2588878870010376}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3627673.3679905","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627673.3679905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2027482274","https://openalex.org/W2803831897","https://openalex.org/W3009901425","https://openalex.org/W3012846134","https://openalex.org/W3036446966","https://openalex.org/W3093551363","https://openalex.org/W3098276446","https://openalex.org/W3099064659","https://openalex.org/W3099152386","https://openalex.org/W3166215705","https://openalex.org/W3167334189","https://openalex.org/W3170068709","https://openalex.org/W3172780638","https://openalex.org/W4212890525","https://openalex.org/W4323066547"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799"],"abstract_inverted_index":{"Graph":[0],"Neural":[1],"Networks":[2],"(GNNs)":[3],"have":[4,14],"achieved":[5],"remarkable":[6],"success":[7,133],"across":[8],"various":[9],"domains,":[10],"yet":[11],"recent":[12],"studies":[13],"exposed":[15],"their":[16],"vulnerability":[17],"to":[18,29,42,55,113,119,130],"backdoor":[19,40,62,91,138],"attacks.":[20],"Backdoor":[21],"attacks":[22],"inject":[23],"triggers":[24,41],"into":[25],"the":[26,31,52,61,65,73,76,81,98,104,120,147],"training":[27,37,105],"set":[28],"poison":[30],"model,":[32],"with":[33,39],"adversaries":[34],"typically":[35],"relabeling":[36,69],"samples":[38,102,117],"a":[43,48,110,136],"target":[44,66,121],"label.":[45,67],"This":[46],"leads":[47],"GNN":[49],"trained":[50],"on":[51,89,142],"poisoned":[53,116],"dataset":[54],"misclassify":[56],"any":[57],"test":[58],"sample":[59],"containing":[60],"trigger":[63,125],"as":[64],"However,":[68],"not":[70,95],"only":[71],"increases":[72],"cost":[74],"of":[75,83,100,149],"attack":[77,132],"but":[78],"also":[79],"raises":[80],"risk":[82],"detection.":[84],"Therefore,":[85],"our":[86,150],"study":[87],"focuses":[88],"clean-label":[90],"attacks,":[92],"which":[93],"do":[94],"require":[96],"modify":[97],"labels":[99],"trigger-attached":[101],"in":[103],"phase.":[106],"Specifically,":[107],"we":[108],"employ":[109],"novel":[111],"method":[112],"select":[114],"effective":[115],"belonging":[118],"class.":[122],"An":[123],"adaptive":[124],"generator":[126],"is":[127],"furthest":[128],"deployed":[129],"high":[131],"rates":[134],"under":[135],"small":[137],"budget.":[139],"Our":[140],"experiments":[141],"four":[143],"public":[144],"datasets":[145],"validate":[146],"effectiveness":[148],"proposed":[151],"attack.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
