[1] |
吴博, 梁循, 张树森, 等. 图神经网络前沿进展与应用[J]. 计算机学报, 2022, 45(1):35-68.
|
|
Wu Bo, Liang Xun, Zhang Shusen, et al. Advances and applicationsins in graph neural network[J]. Chinese Journal of Computers, 2022, 45(1):35-68.
|
[2] |
Wu Z, Pan S, Chen F, et al. A comprehensive survey ongraph neural networks[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 32(1):4-24.
|
[3] |
Li Y, Jiang Y, Li Z, et al. Backdoor learning:A survey[J]. IEEE Transactions on Neural Networks and Learning Systems, 2022, 18(4):38-56.
|
[4] |
Kaviani S, Sohn I. Defense against neural trojan attacks:A survey[J]. Neurocomputing, 2021, 42(3):651-667.
|
[5] |
Ortiz-Jimenez G, Modas A, Moosavi S M, et al. Hold me tight! Influence of discriminative features on deep network boundaries[J]. Advances in Neural Information Processing Systems, 2020, 33(8):2935-2946.
|
[6] |
Yan Z, Li G, TIan Y, et al. Dehib:Deep hidden backdoor attack on semi-supervised learning via adversarial perturbation[C]. Online: AAAI Conference on Artificial Intelligence, 2021:702-709.
|
[7] |
Xu J, Picek S. Poster:Cleanlabel backdoor attack on graph neural networks[C]. Los Angeles: ACM SIGSAC Conference on Computer and Communications Security, 2022:3117-3125.
|
[8] |
Ning R, Li J, Xin C, et al. Invisible poison:A blackbox clean label backdoor attack to deep neural networks[C]. Vancouver: IEEE INFOCOM Conference on Computer Communications, 2021:592-601.
|
[9] |
Chen X, Dong Y, Sun Z, et al. Kallima:A clean-label framework for textual backdoor attacks[C]. Copenhagen: The Twenty-seventh European Symposium on Researchin Computer Security,Copenhagen,Denmark,September, 2022:752-758.
|
[10] |
Kipf T N, Welling M. Semi-supervised classification with graph convolutional networks[C]. Toulon: The Fifth International Conference on Learning Representations, 2017:266-271.
|
[11] |
Hamilton W L, Ying R, Leskovec J. Inductive representation learning on large graphs[C]. Red Hook: The Thirty-first International Conference on Neural Information Processing Systems, 2017:863-870.
|
[12] |
Thekumparampil K K, Wang C, Oh S, et al. Attention-based graph neural network for semi-supervised learning[C]. Vancouver: The Sixth International Conference on Learning Representations, 2018:509-515.
|
[13] |
Verma V, Qu M, Kawaguchi K, et al. Graphmix:Improvedtraining of gnns for semi-supervised learning[C]. Online: AAAI Conference on Artificial Intelligence, 2021:638-643.
|
[14] |
Feng W, Zhang J, Dong Y, et al. Graph random neural networks for semisupervised learning on graphs[J]. Advances in Neural Information Processing Systems, 2020, 33(2):22092-22103.
|
[15] |
Xi Z, Pang R, Ji S, et al. Graph backdoor[C]. Online: US-ENIX Security Symposium, 2021:599-607.
|
[16] |
Xu J, Xue M, Picek S. Explainability-based backdoor attacks against graph neural networks[C]. Abu Dhabi: The Third ACM Workshop on Wireless Security and Machine Learning, 2021:265-271.
|
[17] |
Zhang J, Luo Y. Degree centrality,betweenness centrality,and closeness centrality in social network[C]. Bangkok: The Second International Conference on Modelling,Simulation and Applied Mathematics, 2017:482-490.
|
[18] |
Ruhnau B. Eigenvector-centrality-A node-centrality[J]. Social Networks, 2000, 22(4):357-365.
|
[19] |
Dai H, Li H, Tian T, et al. Adversarial attack on graph structured data[C]. Stockholmsmässan: International Conference on Machine Learning, 2018:632-638.
|
[20] |
Madry A, Makelov A, Schmidt L, et al. Vladu:Towards deep learning models resistant to adversarial attacks[C]. Vancouver: The Sixth International Conference on Learning Representations, 2018:10159-10166.
|
[21] |
Zhang H, Ciss é M, Dauphin Y N, et al. Beyond empirical risk minimization[C]. Vancouver: The Sixth International Conference on Learning Representations, 2018:561-567.
|