{"id":"https://openalex.org/W7127928734","doi":"https://doi.org/10.48550/arxiv.2602.05571","title":"EdgeMask-DG*: Learning Domain-Invariant Graph Structures via Adversarial Edge Masking","display_name":"EdgeMask-DG*: Learning Domain-Invariant Graph Structures via Adversarial Edge Masking","publication_year":2026,"publication_date":"2026-02-05","ids":{"openalex":"https://openalex.org/W7127928734","doi":"https://doi.org/10.48550/arxiv.2602.05571"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.05571","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106616557","display_name":"R. Bhattacharya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bhattacharya, Rishabh","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5007462471","display_name":"Naresh Manwani","orcid":"https://orcid.org/0000-0002-8557-7954"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Manwani, Naresh","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5106616557"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.0052999998442828655,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5533999800682068},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5321999788284302},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5099999904632568},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.5084999799728394},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5033000111579895},{"id":"https://openalex.org/keywords/topological-graph-theory","display_name":"Topological graph theory","score":0.48539999127388},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.382099986076355},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3790000081062317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6014999747276306},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5533999800682068},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5321999788284302},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5250999927520752},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5099999904632568},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.5084999799728394},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5033000111579895},{"id":"https://openalex.org/C157406716","wikidata":"https://www.wikidata.org/wiki/Q4115842","display_name":"Topological graph theory","level":5,"score":0.48539999127388},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3846000134944916},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.382099986076355},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.37070000171661377},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3578000068664551},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.33649998903274536},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3172000050544739},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30070000886917114},{"id":"https://openalex.org/C64339825","wikidata":"https://www.wikidata.org/wiki/Q722659","display_name":"Graph property","level":5,"score":0.28450000286102295},{"id":"https://openalex.org/C13251829","wikidata":"https://www.wikidata.org/wiki/Q3085841","display_name":"Dense graph","level":5,"score":0.27709999680519104},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.2669999897480011},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.259799987077713},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C2779773260","wikidata":"https://www.wikidata.org/wiki/Q11246292","display_name":"Signed graph","level":3,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.05571","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.05571","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.05571","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.05571","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Structural":[0],"shifts":[1],"pose":[2],"a":[3,15,59,84,100,104,174,181,221],"significant":[4],"challenge":[5],"for":[6,177,236],"graph":[7,11,69,135,195],"neural":[8],"networks,":[9,201,203],"as":[10,14],"topology":[12,61,73,139,153,167],"acts":[13],"covariate":[16],"that":[17,38,50,123,187],"can":[18,239],"vary":[19],"across":[20,67],"domains.":[21],"Existing":[22],"domain":[23,196,217],"generalization":[24,197],"methods":[25],"rely":[26],"on":[27,33,193,208],"fixed":[28],"structural":[29,52,113],"augmentations":[30],"or":[31,156],"training":[32],"globally":[34],"perturbed":[35],"graphs,":[36],"mechanisms":[37],"do":[39],"not":[40,55],"pinpoint":[41],"which":[42],"specific":[43],"edges":[44],"encode":[45],"domain-invariant":[46,51],"information.":[47],"We":[48,172,185],"argue":[49],"information":[53],"is":[54,154,159],"rigidly":[56],"tied":[57],"to":[58,93,99,107,129,146,162,219],"single":[60],"but":[62],"resides":[63],"in":[64],"the":[65,137,144,151,160,209,215,226,230],"consensus":[66],"multiple":[68],"structures":[70],"derived":[71],"from":[72,180],"and":[74,204],"feature":[75],"similarity.":[76],"To":[77],"capture":[78],"this,":[79,117],"we":[80,118],"first":[81,161],"propose":[82],"EdgeMask-DG,":[83],"novel":[85],"min-max":[86],"algorithm":[87],"where":[88],"an":[89,121,130],"edge":[90],"masker":[91],"learns":[92],"find":[94],"worst-case":[95,216],"continuous":[96],"masks":[97],"subject":[98],"sparsity":[101],"constraint,":[102],"compelling":[103],"task":[105],"GNN":[106],"perform":[108],"effectively":[109],"under":[110],"these":[111],"adversarial":[112,126,166],"perturbations.":[114],"Building":[115],"upon":[116],"introduce":[119],"EdgeMask-DG*,":[120],"extension":[122],"applies":[124],"this":[125],"masking":[127],"principle":[128],"enriched":[131,134],"graph.":[132],"This":[133],"combines":[136],"original":[138,152],"with":[140,169],"feature-derived":[141],"edges,":[142],"allowing":[143],"model":[145],"discover":[147],"invariances":[148],"even":[149],"when":[150],"noisy":[155],"domain-specific.":[157],"EdgeMask-DG*":[158,188,213],"systematically":[163],"combine":[164],"adaptive":[165],"search":[168],"feature-enriched":[170],"graphs.":[171,206],"provide":[173],"formal":[175],"justification":[176],"our":[178,237],"approach":[179],"robust":[182],"optimization":[183],"perspective.":[184],"demonstrate":[186],"achieves":[189],"new":[190],"state-of-the-art":[191],"performance":[192],"diverse":[194],"benchmarks,":[198],"including":[199],"citation":[200],"social":[202],"temporal":[205],"Notably,":[207],"Cora":[210],"OOD":[211],"benchmark,":[212],"lifts":[214],"accuracy":[218],"78.0\\%,":[220],"+3.8":[222],"pp":[223],"improvement":[224],"over":[225],"prior":[227],"state":[228],"of":[229],"art":[231],"(74.2\\%).":[232],"The":[233],"source":[234],"code":[235],"experiments":[238],"be":[240],"found":[241],"here:":[242],"https://anonymous.4open.science/r/TMLR-EAEF/":[243]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-02-07T00:00:00"}
