K Li, Y Liu, X Ao, J Chi, J Feng, H Yang… - Proceedings of the 28th …, 2022 - dl.acm.org
Benefiting from the message passing mechanism, Graph Neural Networks (GNNs) have been successful on flourish tasks over graph data. However, recent studies have shown that …
Node injection attack on Graph Neural Networks (GNNs) is an emerging and practical attack scenario that the attacker injects malicious nodes rather than modifying original nodes or …
C Huang, H Li - Proceedings of the 32nd ACM International …, 2023 - dl.acm.org
Recommendation systems (RS) are crucial for alleviating the information overload problem. Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to …
Abstract Graph Neural Networks (GNNs) have demonstrated remarkable success across diverse fields, yet remain susceptible to subtle adversarial perturbations that significantly …
X Zhang, P Bao, S Pan - Proceedings of the 17th ACM International …, 2024 - dl.acm.org
Graph neural networks (GNNs) have achieved impressive performance in various graph- related tasks. However, recent studies have found that GNNs are vulnerable to adversarial …
L Zhu, K Feng, Z Pu, W Ma - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Real-time traffic prediction models play a pivotal role in smart mobility systems and have been widely used in route guidance, emerging mobility services, and advanced traffic …
Graph perturbation hinders graph models in real applications, and thus defense methods against graph perturbation have been attracting increasing attention. However, current …