1. Jinyin Chen , Ziqiang Shi , Yangyang Wu , Xuanheng Xu , Haibin Zheng; “ Link Prediction Adversarial Attack ”; https://arxiv.org/abs/ 1810 .01110; 2018. Jinyin Chen, Ziqiang Shi, Yangyang Wu, Xuanheng Xu, Haibin Zheng; “Link Prediction Adversarial Attack”; https://arxiv.org/abs/1810.01110; 2018.
2. Jinyin Chen , Yangyang Wu , Xiang Lin , Qi Xuan; “ Can Adversarial Network Attack be Defended”;https://arxiv.org/abs/1903.05994 ; 2019 ; Jinyin Chen, Yangyang Wu, Xiang Lin, Qi Xuan; “Can Adversarial Network Attack be Defended”;https://arxiv.org/abs/1903.05994; 2019;
3. Hanjun Dai , Hui Li , Tian Tian , Xin Huang , Lin Wang , Jun Zhu , Le Song; “ Adversarial Attack on Graph Structured Data ”; https://arxiv.org/abs/ 1806 .02371; 2018. Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, Le Song; “Adversarial Attack on Graph Structured Data”; https://arxiv.org/abs/1806.02371; 2018.
4. Daniel Zügner , Amir Akbarnejad , Stephan Günnemann; “ Adversarial Attacks on Neural Networks for Graph Data ”; https://dl.acm.org/doi/10.1145/32 1981 9.3220078; 2018. Daniel Zügner, Amir Akbarnejad, Stephan Günnemann; “Adversarial Attacks on Neural Networks for Graph Data”; https://dl.acm.org/doi/10.1145/3219819.3220078; 2018.
5. Zaixi Zhang , Jinyuan Jia , Binghui Wang , Neil Zhenqiang Gong ; “Backdoor Attacks to Graph Neural Networks” ; https://dl.acm.org/doi/10.1145/3450569.3463560; 2021 ; Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong; “Backdoor Attacks to Graph Neural Networks”; https://dl.acm.org/doi/10.1145/3450569.3463560; 2021;