ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.07933
  4. Cited By
Adversarial Attack on Community Detection by Hiding Individuals

Adversarial Attack on Community Detection by Hiding Individuals

The Web Conference (WWW), 2020
22 January 2020
Jia Li
Honglei Zhang
Zhichao Han
Yu Rong
Hong Cheng
Junzhou Huang
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Attack on Community Detection by Hiding Individuals"

24 / 24 papers shown
LoReTTA: A Low Resource Framework To Poison Continuous Time Dynamic Graphs
LoReTTA: A Low Resource Framework To Poison Continuous Time Dynamic Graphs
Himanshu Pal
Venkata Sai Pranav Bachina
Ankit Gangwal
Charu Sharma
AAMLAI4TS
179
0
0
10 Nov 2025
Unnoticeable Community Deception via Multi-objective Optimization
Unnoticeable Community Deception via Multi-objective Optimization
Junyuan Fang
Huimin Liu
Yueqi Peng
Jiajing Wu
Zibin Zheng
Chi K. Tse
128
0
0
01 Sep 2025
AMNCutter: Affinity-Attention-Guided Multi-View Normalized Cutter for
  Unsupervised Surgical Instrument Segmentation
AMNCutter: Affinity-Attention-Guided Multi-View Normalized Cutter for Unsupervised Surgical Instrument SegmentationIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2024
Mingyu Sheng
Jianan Fan
Dongnan Liu
Ron Kikinis
Weidong Cai
379
3
0
06 Nov 2024
Expander Hierarchies for Normalized Cuts on Graphs
Expander Hierarchies for Normalized Cuts on Graphs
Kathrin Hanauer
Monika Henzinger
Robin Münk
Harald Räcke
Maximilian Vötsch
201
0
0
20 Jun 2024
Rethinking Independent Cross-Entropy Loss For Graph-Structured Data
Rethinking Independent Cross-Entropy Loss For Graph-Structured Data
Rui Miao
Kaixiong Zhou
Yili Wang
Ninghao Liu
Ying Wang
Xin Wang
298
5
0
24 May 2024
Safety in Graph Machine Learning: Threats and Safeguards
Safety in Graph Machine Learning: Threats and Safeguards
Song Wang
Yushun Dong
Binchi Zhang
Zihan Chen
Xingbo Fu
Yinhan He
Cong Shen
Chuxu Zhang
Nitesh Chawla
Wenlin Yao
412
11
0
17 May 2024
Single Node Injection Label Specificity Attack on Graph Neural Networks
  via Reinforcement Learning
Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement LearningIEEE Transactions on Computational Social Systems (IEEE TCSS), 2023
Dayuan Chen
Jian Zhang
Yuqian Lv
Jinhuan Wang
Hongjie Ni
Shanqing Yu
Zhen Wang
Qi Xuan
AAML
253
7
0
04 May 2023
Turning Strengths into Weaknesses: A Certified Robustness Inspired
  Attack Framework against Graph Neural Networks
Turning Strengths into Weaknesses: A Certified Robustness Inspired Attack Framework against Graph Neural NetworksComputer Vision and Pattern Recognition (CVPR), 2023
Binghui Wang
Meng Pang
Yun Dong
AAML
233
18
0
10 Mar 2023
Resisting Graph Adversarial Attack via Cooperative Homophilous
  Augmentation
Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation
Zhihao Zhu
Chenwang Wu
Mingyang Zhou
Hao Liao
DefuLian
Enhong Chen
AAML
213
4
0
15 Nov 2022
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node
  Classification
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node ClassificationIEEE Transactions on Knowledge and Data Engineering (TKDE), 2022
Yulin Zhu
Liang Tong
Gaolei Li
Xiapu Luo
Wei Song
193
17
0
25 Oct 2022
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social
  Networks
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social NetworksIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Yulin Zhu
Tomasz P. Michalak
Xiapu Luo
Xiaoge Zhang
Wei Song
AAML
312
2
0
27 Jun 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical GuaranteesComputer Vision and Pattern Recognition (CVPR), 2022
Binghui Wang
Youqin Li
Pan Zhou
AAML
239
19
0
07 May 2022
An Adversarial Attack Analysis on Malicious Advertisement URL Detection
  Framework
An Adversarial Attack Analysis on Malicious Advertisement URL Detection FrameworkIEEE Transactions on Network and Service Management (IEEE TNSM), 2022
Ehsan Nowroozi
A. Abhishek
Mohammadreza Mohammadi
Mauro Conti
AAML
212
47
0
27 Apr 2022
Neighboring Backdoor Attacks on Graph Convolutional Network
Neighboring Backdoor Attacks on Graph Convolutional Network
Liang Chen
Qibiao Peng
Jintang Li
Yang Liu
Jiawei Chen
Yong Li
Zibin Zheng
GNNAAML
268
13
0
17 Jan 2022
Task and Model Agnostic Adversarial Attack on Graph Neural Networks
Task and Model Agnostic Adversarial Attack on Graph Neural NetworksAAAI Conference on Artificial Intelligence (AAAI), 2021
Kartik Sharma
S. Verma
Sourav Medya
Arnab Bhattacharya
Jignesh M. Patel
AAML
290
14
0
25 Dec 2021
Surrogate Representation Learning with Isometric Mapping for Gray-box
  Graph Adversarial Attacks
Surrogate Representation Learning with Isometric Mapping for Gray-box Graph Adversarial AttacksWeb Search and Data Mining (WSDM), 2021
Zihan Liu
Yun Luo
Z. Zang
Stan Z. Li
AAML
391
17
0
20 Oct 2021
How does Heterophily Impact the Robustness of Graph Neural Networks?
  Theoretical Connections and Practical Implications
How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical ImplicationsKnowledge Discovery and Data Mining (KDD), 2021
Jiong Zhu
Junchen Jin
Donald Loveland
Michael T. Schaub
Danai Koutra
AAML
457
44
0
14 Jun 2021
Generative Adversarial Networks: A Survey Towards Private and Secure
  Applications
Generative Adversarial Networks: A Survey Towards Private and Secure ApplicationsACM Computing Surveys (CSUR), 2021
Zhipeng Cai
Zuobin Xiong
Honghui Xu
Peng-Shuai Wang
Wei Li
Yi-Lun Pan
317
189
0
07 Jun 2021
Mask-GVAE: Blind Denoising Graphs via Partition
Mask-GVAE: Blind Denoising Graphs via PartitionThe Web Conference (WWW), 2021
Jia Li
Mengzhou Liu
Honglei Zhang
Pengyun Wang
Yong Wen
Lujia Pan
Hong Cheng
223
10
0
08 Feb 2021
Model Extraction Attacks on Graph Neural Networks: Taxonomy and
  Realization
Model Extraction Attacks on Graph Neural Networks: Taxonomy and RealizationACM Asia Conference on Computer and Communications Security (AsiaCCS), 2020
Bang Wu
Xiangwen Yang
Shirui Pan
Lizhen Qu
MIACVMLAU
271
74
0
24 Oct 2020
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to
  Any-Layer Graph Neural Networks via Influence Function
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence FunctionWeb Search and Data Mining (WSDM), 2020
Binghui Wang
Tianxiang Zhou
Min Lin
Pan Zhou
Ang Li
Meng Pang
Xue Yang
Yiran Chen
AAML
634
24
0
01 Sep 2020
GraphReach: Position-Aware Graph Neural Network using Reachability
  Estimations
GraphReach: Position-Aware Graph Neural Network using Reachability Estimations
Sunil Nishad
Shubhangi Agarwal
A. Bhattacharya
Jignesh M. Patel
GNN
255
24
0
19 Aug 2020
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and
  Empirical Studies
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies
Wei Jin
Yaxin Li
Han Xu
Yiqi Wang
Shuiwang Ji
Charu C. Aggarwal
Shucheng Zhou
AAMLGNN
456
106
0
02 Mar 2020
Adversarial Attack and Defense on Graph Data: A Survey
Adversarial Attack and Defense on Graph Data: A Survey
Lichao Sun
Yingtong Dou
Carl Yang
Ji Wang
Yixin Liu
Philip S. Yu
Lifang He
Yangqiu Song
GNNAAML
651
374
0
26 Dec 2018
1
Page 1 of 1