{"id":"https://openalex.org/W4412878605","doi":"https://doi.org/10.1186/s42400-024-00353-2","title":"Clean-label backdoor attack on link prediction task","display_name":"Clean-label backdoor attack on link prediction task","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4412878605","doi":"https://doi.org/10.1186/s42400-024-00353-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00353-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00353-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00353-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00353-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016621833","display_name":"Jianye Mo","orcid":"https://orcid.org/0000-0001-5050-8492"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junming Mo","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041210918","display_name":"Ming Xu","orcid":"https://orcid.org/0000-0001-9332-5258"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Xu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106884197","display_name":"Xiaogang Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaogang Xing","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, 310018, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016621833"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0974529,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9589859247207642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5539311170578003},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5195049047470093},{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.5064750909805298},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36063331365585327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2862462103366852},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24647808074951172},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21102529764175415}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9589859247207642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5539311170578003},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5195049047470093},{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.5064750909805298},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36063331365585327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2862462103366852},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24647808074951172},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21102529764175415},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00353-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00353-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00353-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b490cdb072f040cb8d3a2a6312ce57c8","is_oa":true,"landing_page_url":"https://doaj.org/article/b490cdb072f040cb8d3a2a6312ce57c8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-11 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00353-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00353-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00353-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412878605.pdf","grobid_xml":"https://content.openalex.org/works/W4412878605.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W2096451472","https://openalex.org/W2153959628","https://openalex.org/W2154851992","https://openalex.org/W2162630660","https://openalex.org/W2168190036","https://openalex.org/W2583143836","https://openalex.org/W2808409763","https://openalex.org/W2903938653","https://openalex.org/W2911293880","https://openalex.org/W2964583308","https://openalex.org/W3012846134","https://openalex.org/W3016622506","https://openalex.org/W3025110576","https://openalex.org/W3039098095","https://openalex.org/W3082550533","https://openalex.org/W3097300053","https://openalex.org/W3104097132","https://openalex.org/W3107337211","https://openalex.org/W3114233038","https://openalex.org/W3155871095","https://openalex.org/W3167334189","https://openalex.org/W3170068709","https://openalex.org/W3172780638","https://openalex.org/W3194156258","https://openalex.org/W3205831761","https://openalex.org/W3210577294","https://openalex.org/W3215700529","https://openalex.org/W4212835176","https://openalex.org/W4283462727","https://openalex.org/W4284682762","https://openalex.org/W4295921726","https://openalex.org/W4308410017","https://openalex.org/W4309862248","https://openalex.org/W4321434205","https://openalex.org/W4322614756","https://openalex.org/W4323066547","https://openalex.org/W4323655037","https://openalex.org/W4328028655","https://openalex.org/W4361857326","https://openalex.org/W4387848675","https://openalex.org/W4388709745","https://openalex.org/W4388867373","https://openalex.org/W4402095797"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799"],"abstract_inverted_index":{"Abstract":[0],"Graph":[1],"Neural":[2],"Networks":[3],"(GNNs)":[4],"have":[5,19],"shown":[6,20],"excellent":[7],"performance":[8],"as":[9,78,121],"a":[10,59,192],"powerful":[11],"tool":[12],"on":[13,25,37,64,170],"link":[14,22,38,45,65],"prediction":[15,23,39,66],"task.":[16],"Recent":[17],"studies":[18],"that":[21],"based":[24],"GNNs":[26],"is":[27,69],"vulnerable":[28],"to":[29,88,93,127,158],"backdoor":[30,34,61,79],"attacks.":[31],"However,":[32],"existing":[33],"attack":[35,62,186],"methods":[36],"task":[40,67],"require":[41],"modification":[42],"of":[43,52,97,110,134,140,162,189,195,202],"the":[44,53,95,98,102,106,111,117,122,128,132,135,137,141,144,147,151,154,160,163,180,184,200],"state,":[46],"which":[47,198],"results":[48],"in":[49,71,153],"poor":[50],"stealthiness":[51,96],"backdoor.":[54],"To":[55,130],"address":[56],"this":[57,72],"issue,":[58],"clean-label":[60],"method":[63,182],"(CL-Link)":[68],"proposed":[70,181,204],"paper.":[73],"Specifically,":[74],"CL-Link":[75,100],"utilizes":[76,116],"subgraphs":[77,87],"triggers":[80],"and":[81,143,150,177,179],"achieves":[82],"trigger":[83,103,148,164],"injection":[84],"by":[85],"attaching":[86],"target":[89,112],"links.":[90,113],"In":[91],"order":[92],"enhance":[94],"attack,":[99,136],"attaches":[101],"without":[104],"modifying":[105],"original":[107,118],"connection":[108,119],"state":[109,120],"Instead,":[114],"it":[115],"label,":[123],"thus":[124],"minimizing":[125],"disturbances":[126],"dataset.":[129],"ensure":[131],"effectiveness":[133,201],"gradient":[138],"information":[139],"model":[142],"similarity":[145],"between":[146],"nodes":[149,152],"graph":[155],"are":[156],"used":[157],"optimize":[159],"features":[161],"nodes.":[165],"Extensive":[166],"experiments":[167],"were":[168],"performed":[169],"multiple":[171],"benchmark":[172],"datasets":[173],"(i.e.,":[174],"Cora,":[175],"Citeseer,":[176],"Pubmed),":[178],"achieved":[183],"highest":[185],"success":[187],"rate":[188,194],"97.69%":[190],"with":[191],"poisoning":[193],"only":[196],"5%,":[197],"validates":[199],"our":[203],"approach.":[205]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
