iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3448891.3448939
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:49:01Z","timestamp":1726850941275},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3448891.3448939","type":"proceedings-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T01:43:00Z","timestamp":1628559780000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Quantifying Privacy Leakage in Graph Embedding"],"prefix":"10.1145","author":[{"given":"Vasisht","family":"Duddu","sequence":"first","affiliation":[{"name":"Lyon and 318"}]},{"given":"Antoine","family":"Boutet","sequence":"additional","affiliation":[{"name":"Lyon and 318"}]},{"given":"Virat","family":"Shejwalkar","sequence":"additional","affiliation":[{"name":"Amhrest and 318"}]}],"member":"320","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Martin Abadi Andy Chu Ian Goodfellow H.\u00a0Brendan McMahan Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep Learning with Differential Privacy. In CCS. 308\u2013\u2013318. Martin Abadi Andy Chu Ian Goodfellow H.\u00a0Brendan McMahan Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep Learning with Differential Privacy. In CCS. 308\u2013\u2013318.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.071829"},{"key":"e_1_3_2_1_3_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML. Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML."},{"key":"e_1_3_2_1_4_1","volume-title":"DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks. In ASIACCS.","author":"Boutet Antoine","year":"2021","unstructured":"Antoine Boutet , Carole Frindel , S\u00e9bastien Gambs , Th\u00e9o Jourdan , and Claude\u00a0Rosin Ngueveu . 2021 . DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks. In ASIACCS. Antoine Boutet, Carole Frindel, S\u00e9bastien Gambs, Th\u00e9o Jourdan, and Claude\u00a0Rosin Ngueveu. 2021. DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks. In ASIACCS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"e_1_3_2_1_6_1","unstructured":"Nicholas Carlini Chang Liu \u00dalfar Erlingsson Jernej Kos and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In USENIX Security. 267\u2013284. Nicholas Carlini Chang Liu \u00dalfar Erlingsson Jernej Kos and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In USENIX Security. 267\u2013284."},{"key":"e_1_3_2_1_7_1","volume-title":"A Tutorial on Network Embeddings. arXiv:1808.02590","author":"Chen Haochen","year":"2018","unstructured":"Haochen Chen , Bryan Perozzi , Rami Al-Rfou , and Steven Skiena . 2018. A Tutorial on Network Embeddings. arXiv:1808.02590 ( 2018 ). Haochen Chen, Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2018. A Tutorial on Network Embeddings. arXiv:1808.02590 (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"Topology Adaptive Graph Convolutional Networks. arXiv:1710.10370","author":"Du Jian","year":"2018","unstructured":"Jian Du , Shanghang Zhang , Guanhang Wu , Jos\u00e9 M.\u00a0F. Moura , and Soummya Kar . 2018. Topology Adaptive Graph Convolutional Networks. arXiv:1710.10370 ( 2018 ). Jian Du, Shanghang Zhang, Guanhang Wu, Jos\u00e9 M.\u00a0F. Moura, and Soummya Kar. 2018. Topology Adaptive Graph Convolutional Networks. arXiv:1710.10370 (2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"arXiv:1910.14409","author":"Duddu Vasisht","year":"2019","unstructured":"Vasisht Duddu and D\u00a0Vijay Rao . 2019. Quantifying (Hyper) Parameter Leakage in Machine Learning . arXiv:1910.14409 ( 2019 ). Vasisht Duddu and D\u00a0Vijay Rao. 2019. Quantifying (Hyper) Parameter Leakage in Machine Learning. arXiv:1910.14409 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Stealing Neural Networks via Timing Side Channels. arxiv:1812.11720","author":"Duddu Vasisht","year":"2018","unstructured":"Vasisht Duddu , Debasis Samanta , D\u00a0Vijay Rao , and Valentina\u00a0 E. Balas . 2018. Stealing Neural Networks via Timing Side Channels. arxiv:1812.11720 ( 2018 ). Vasisht Duddu, Debasis Samanta, D\u00a0Vijay Rao, and Valentina\u00a0E. Balas. 2018. Stealing Neural Networks via Timing Side Channels. arxiv:1812.11720 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model Inversion Attacks That Exploit Confidence Information and Basic Countermeasures. In CCS. 1322\u2013\u20131333. Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model Inversion Attacks That Exploit Confidence Information and Basic Countermeasures. In CCS. 1322\u2013\u20131333.","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Karan Ganju Qi Wang Wei Yang Carl\u00a0A. Gunter and Nikita Borisov. 2018. Property Inference Attacks on Fully Connected Neural Networks Using Permutation Invariant Representations. In CCS. 619\u2013633. Karan Ganju Qi Wang Wei Yang Carl\u00a0A. Gunter and Nikita Borisov. 2018. Property Inference Attacks on Fully Connected Neural Networks Using Permutation Invariant Representations. In CCS. 619\u2013633.","DOI":"10.1145\/3243734.3243834"},{"key":"e_1_3_2_1_13_1","unstructured":"N.Z. Gong and B. Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors. In USENIX Security. 979\u2013995. N.Z. Gong and B. Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors. In USENIX Security. 979\u2013995."},{"key":"e_1_3_2_1_14_1","unstructured":"Neil\u00a0Zhenqiang Gong and Bin Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors. In USENIX Security. 979\u2013995. Neil\u00a0Zhenqiang Gong and Bin Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors. In USENIX Security. 979\u2013995."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable Feature Learning for Networks. In KDD. Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable Feature Learning for Networks. In KDD.","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_16_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NeurIPS I.\u00a0Guyon U.\u00a0V. Luxburg S.\u00a0Bengio H.\u00a0Wallach R.\u00a0Fergus S.\u00a0Vishwanathan and R.\u00a0Garnett (Eds.). 1024\u20131034. Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NeurIPS I.\u00a0Guyon U.\u00a0V. Luxburg S.\u00a0Bengio H.\u00a0Wallach R.\u00a0Fergus S.\u00a0Vishwanathan and R.\u00a0Garnett (Eds.). 1024\u20131034."},{"key":"e_1_3_2_1_17_1","volume-title":"LOGAN: Membership Inference Attacks Against Generative Models. PETS1(2019), 133 \u2013 152.","author":"Hayes Jamie","year":"2019","unstructured":"Jamie Hayes , Luca Melis , George Danezis , and Emiliano\u00a0De Cristofaro . 2019 . LOGAN: Membership Inference Attacks Against Generative Models. PETS1(2019), 133 \u2013 152. Jamie Hayes, Luca Melis, George Danezis, and Emiliano\u00a0De Cristofaro. 2019. LOGAN: Membership Inference Attacks Against Generative Models. PETS1(2019), 133 \u2013 152."},{"key":"e_1_3_2_1_18_1","unstructured":"Xinlei He Jinyuan Jia Michael Backes Neil\u00a0Zhenqiang Gong and Yang Zhang. 2021. Stealing Links from Graph Neural Networks. In USENIX Security. Xinlei He Jinyuan Jia Michael Backes Neil\u00a0Zhenqiang Gong and Yang Zhang. 2021. Stealing Links from Graph Neural Networks. In USENIX Security."},{"key":"e_1_3_2_1_19_1","volume-title":"Attriguard: A Practical Defense against Attribute Inference Attacks via Adversarial Machine Learning. In USENIX Security. 513\u2013\u2013529.","author":"Jia Jinyuan","year":"2018","unstructured":"Jinyuan Jia and Neil\u00a0Zhenqiang Gong . 2018 . Attriguard: A Practical Defense against Attribute Inference Attacks via Adversarial Machine Learning. In USENIX Security. 513\u2013\u2013529. Jinyuan Jia and Neil\u00a0Zhenqiang Gong. 2018. Attriguard: A Practical Defense against Attribute Inference Attacks via Adversarial Machine Learning. In USENIX Security. 513\u2013\u2013529."},{"key":"e_1_3_2_1_20_1","unstructured":"Jinyuan Jia Ahmed Salem Michael Backes Yang Zhang and Neil\u00a0Zhenqiang Gong. 2019. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. In CCS. 259\u2013274. Jinyuan Jia Ahmed Salem Michael Backes Yang Zhang and Neil\u00a0Zhenqiang Gong. 2019. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. In CCS. 259\u2013274."},{"key":"e_1_3_2_1_21_1","unstructured":"Jinyuan Jia Binghui Wang Le Zhang and Neil\u00a0Zhenqiang Gong. 2017. AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields. In WWW. 1561\u20131569. Jinyuan Jia Binghui Wang Le Zhang and Neil\u00a0Zhenqiang Gong. 2017. AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields. In WWW. 1561\u20131569."},{"key":"e_1_3_2_1_22_1","volume-title":"Kipf and Max Welling","author":"N.","year":"2017","unstructured":"Thomas\u00a0 N. Kipf and Max Welling . 2017 . Semi-Supervised Classification with Graph Convolutional Networks. In ICLR. Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR."},{"key":"e_1_3_2_1_23_1","unstructured":"Johannes Klicpera Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Combining Neural Networks with Personalized PageRank for Classification on Graphs. In ICLR. Johannes Klicpera Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Combining Neural Networks with Personalized PageRank for Classification on Graphs. In ICLR."},{"key":"e_1_3_2_1_24_1","unstructured":"Qimai Li Zhichao Han and Xiao-Ming Wu. 2018. Deeper Insights into Graph Convolutional Networks for Semi-Supervised Learning. In AAAI. Qimai Li Zhichao Han and Xiao-Ming Wu. 2018. Deeper Insights into Graph Convolutional Networks for Semi-Supervised Learning. In AAAI."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Luca Melis Congzheng Song Emiliano De\u00a0Cristofaro and Vitaly Shmatikov. 2019. Exploiting Unintended Feature Leakage in Collaborative Learning. In SP. 691\u2013706. Luca Melis Congzheng Song Emiliano De\u00a0Cristofaro and Vitaly Shmatikov. 2019. Exploiting Unintended Feature Leakage in Collaborative Learning. In SP. 691\u2013706.","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_3_2_1_26_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and Their Compositionality. In NIPS. 3111\u2013\u20133119. Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and Their Compositionality. In NIPS. 3111\u2013\u20133119."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine Learning with Membership Privacy Using Adversarial Regularization. In CCS. 634\u2013646. Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine Learning with Membership Privacy Using Adversarial Regularization. In CCS. 634\u2013646.","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"M. Nasr R. Shokri and A. Houmansadr. 2019. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. In SP. 739\u2013753. M. Nasr R. Shokri and A. Houmansadr. 2019. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. In SP. 739\u2013753.","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_29_1","volume-title":"NIPS Workshop. 2\u201388","author":"Noulas Anastasios","year":"2009","unstructured":"Anastasios Noulas , Mirco Musolesi , Massimiliano Pontil , and Cecilia Mascolo . 2009 . Inferring interests from mobility and social interactions . In NIPS Workshop. 2\u201388 . Anastasios Noulas, Mirco Musolesi, Massimiliano Pontil, and Cecilia Mascolo. 2009. Inferring interests from mobility and social interactions. In NIPS Workshop. 2\u201388."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"X. Pan M. Zhang S. Ji and M. Yang. 2020. Privacy Risks of General-Purpose Language Models. In SP. X. Pan M. Zhang S. Ji and M. Yang. 2020. Privacy Risks of General-Purpose Language Models. In SP.","DOI":"10.1109\/SP40000.2020.00095"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Bryan Perozzi Rami Al-Rfou and Steven Skiena. 2014. DeepWalk: Online Learning of Social Representations. In KDD. 701\u2013710. Bryan Perozzi Rami Al-Rfou and Steven Skiena. 2014. DeepWalk: Online Learning of Social Representations. In KDD. 701\u2013710.","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Ahmed Salem Yang Zhang Mathias Humbert Pascal Berrang Mario Fritz and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In NDSS. Ahmed Salem Yang Zhang Mathias Humbert Pascal Berrang Mario Fritz and Michael Backes. 2019. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In NDSS.","DOI":"10.14722\/ndss.2019.23119"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Virat Shejwalkar and Amir Houmansadr. 2021. Membership Privacy for Machine Learning Models Through Knowledge Transfer. In AAAI. Virat Shejwalkar and Amir Houmansadr. 2021. Membership Privacy for Machine Learning Models Through Knowledge Transfer. In AAAI.","DOI":"10.1609\/aaai.v35i11.17150"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"R. Shokri M. Stronati C. Song and V. Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In SP. 3\u201318. R. Shokri M. Stronati C. Song and V. Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In SP. 3\u201318.","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Congzheng Song and Ananth Raghunathan. 2020. Information Leakage in Embedding Models. arXiv:2004.00053 Congzheng Song and Ananth Raghunathan. 2020. Information Leakage in Embedding Models. arXiv:2004.00053","DOI":"10.1145\/3372297.3417270"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Congzheng Song Thomas Ristenpart and Vitaly Shmatikov. 2017. Machine Learning Models That Remember Too Much. In CCS. 587\u2013\u2013601. Congzheng Song Thomas Ristenpart and Vitaly Shmatikov. 2017. Machine Learning Models That Remember Too Much. In CCS. 587\u2013\u2013601.","DOI":"10.1145\/3133956.3134077"},{"key":"e_1_3_2_1_37_1","unstructured":"Congzheng Song and Vitaly Shmatikov. 2020. Overlearning Reveals Sensitive Attributes. In ICLR. Congzheng Song and Vitaly Shmatikov. 2020. Overlearning Reveals Sensitive Attributes. In ICLR."},{"key":"e_1_3_2_1_38_1","volume-title":"Systematic Evaluation of Privacy Risks of Machine Learning Models. arXiv:2003.10595","author":"Song Liwei","year":"2020","unstructured":"Liwei Song and Prateek Mittal . 2020. Systematic Evaluation of Privacy Risks of Machine Learning Models. arXiv:2003.10595 ( 2020 ). Liwei Song and Prateek Mittal. 2020. Systematic Evaluation of Privacy Risks of Machine Learning Models. arXiv:2003.10595 (2020)."},{"key":"e_1_3_2_1_39_1","unstructured":"Laurens van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research(2008) 2579\u20132605. Laurens van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research(2008) 2579\u20132605."},{"key":"e_1_3_2_1_40_1","unstructured":"Petar Veli\u010dkovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2018. Graph Attention Networks. In ICLR. Petar Veli\u010dkovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2018. Graph Attention Networks. In ICLR."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"B. Wang and N.\u00a0Z. Gong. 2018. Stealing Hyperparameters in Machine Learning. In SP. 36\u201352. B. Wang and N.\u00a0Z. Gong. 2018. Stealing Hyperparameters in Machine Learning. In SP. 36\u201352.","DOI":"10.1109\/SP.2018.00038"},{"key":"e_1_3_2_1_42_1","volume-title":"DPNE: Differentially Private Network Embedding. 235\u2013246.","author":"Xu Depeng","year":"2018","unstructured":"Depeng Xu , Shuhan Yuan , Xintao Wu , and HaiNhat Phan . 2018 . DPNE: Differentially Private Network Embedding. 235\u2013246. Depeng Xu, Shuhan Yuan, Xintao Wu, and HaiNhat Phan. 2018. DPNE: Differentially Private Network Embedding. 235\u2013246."},{"key":"e_1_3_2_1_43_1","unstructured":"Lili\u00a0Jiang Xuan-Son\u00a0Vu Son N.\u00a0Tran. 2019. dpUGC: Learn Differentially Private Representation for User Generated Contents. In CICLing. Lili\u00a0Jiang Xuan-Son\u00a0Vu Son N.\u00a0Tran. 2019. dpUGC: Learn Differentially Private Representation for User Generated Contents. In CICLing."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Dingqi Yang Bingqing Qu Jie Yang and Philippe Cudre-Mauroux. 2019. Revisiting user mobility and social relationships in lbsns: a hypergraph embedding approach. In WWW. 2147\u20132157. Dingqi Yang Bingqing Qu Jie Yang and Philippe Cudre-Mauroux. 2019. Revisiting user mobility and social relationships in lbsns: a hypergraph embedding approach. In WWW. 2147\u20132157.","DOI":"10.1145\/3308558.3313635"},{"key":"e_1_3_2_1_45_1","volume-title":"Graph neural networks: A review of methods and applications. arXiv:1812.08434","author":"Zhou Jie","year":"2018","unstructured":"Jie Zhou , Ganqu Cui , Zhengyan Zhang , Cheng Yang , Zhiyuan Liu , Lifeng Wang , Changcheng Li , and Maosong Sun . 2018. Graph neural networks: A review of methods and applications. arXiv:1812.08434 ( 2018 ). Jie Zhou, Ganqu Cui, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, Lifeng Wang, Changcheng Li, and Maosong Sun. 2018. Graph neural networks: A review of methods and applications. arXiv:1812.08434 (2018)."},{"key":"e_1_3_2_1_46_1","unstructured":"Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD. 1399\u2013\u20131407. Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD. 1399\u2013\u20131407."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial Attacks on Neural Networks for Graph Data. In KDD. 2847\u2013\u20132856. Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial Attacks on Neural Networks for Graph Data. In KDD. 2847\u2013\u20132856.","DOI":"10.1145\/3219819.3220078"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD. 246\u2013\u2013256. Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable Robustness and Robust Training for Graph Convolutional Networks. In KDD. 246\u2013\u2013256.","DOI":"10.1145\/3292500.3330905"}],"event":{"name":"MobiQuitous '20: Computing, Networking and Services","location":"Darmstadt Germany","acronym":"MobiQuitous '20"},"container-title":["MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448891.3448939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T05:00:11Z","timestamp":1681794011000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448891.3448939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":48,"alternative-id":["10.1145\/3448891.3448939","10.1145\/3448891"],"URL":"https:\/\/doi.org\/10.1145\/3448891.3448939","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2021-08-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}