参考文献/References:
[1] Zügner D, Akbarnejad A, Günnemann S. Adversarial attacks on neural networks for graph data[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. New York: ACM, 2018: 2847-2856.
[2] Zhu Yanqiao, Xu Yichen, Yu Feng, et al. Deep graph contrastive representation learning[PP/OL]. V2. arXiv(2020-07-13)[2025-09-30]. https://arxiv.org/abs/2006.04131.
[3] Battaglia P W, Hamrick J B, Bapst V, et al. Relational inductive biases, deep learning, and graph networks[PP/OL]. V3. arXiv(2018-10-17)[2025-09-30]. https://arxiv.org/abs/1806. 01261.
[4] Zhang Xiang, Zitnik M. GNNGuard: defending graph neural networks against adversarial attacks[PP/OL]. V3. arXiv(2020-10-28)[2025-09-30]. https://arxiv.org/abs/2006. 08149.
[5] Chen Ting, Kornblith S, Norouzi M, et al. A simple framework for contrastive learning of visual representations[PP/OL]. V3. arXiv(2020-07-01)[2025-09-30]. https://arxiv.org/abs/2002. 05709.
[6] Jin Wei, Ma Yao, Liu Xiaorui, et al. Graph structure learning for robust graph neural networks[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. New York: ACM, 2020: 66-74.
[7] Li Gege, Ye Zhonglin, Cao Shujuan, et al. An unsupervised link prediction algorithm based on an approximate graph neural network framework[J]. Journal of Zhengzhou University (Engineering Science), 2024, 45(6): 75-82. [李格格, 冶忠林, 曹淑娟, 等. 一种近似图神经网络框架的无监督链路预测算法[J]. 郑州大学学报(工学版), 2024, 45(6): 75-82.]
[8] Veličković P, Fedus W, Hamilton W L, et al. Deep graph infomax[PP/OL]. V2. arXiv(2018-12-21)[2025-09-31]. https://arxiv.org/abs/1809. 10341.
[9] Fanseu Kamboua B, Zhang Lin, Ma Kaili, et al. GRACE: A general graph convolution framework for attributed graph clustering[J]. ACM Transactions on Knowledge Discovery from Data, 2023, 17(3): 1-31.
[10] Zhu Yanqiao, Xu Yichen, Yu Feng, et al. Graph contrastive learning with adaptive augmentation[C]//Proceedings of the Web Conference 2021. New York: ACM, 2021: 2069-2080.
[11] Thakoor S, Tallec C, Azar M G, et al. Large-scale representation learning on graphs via bootstrapping[PP/OL]. V3. arXiv(2023-02-20)[2025-09-30]. https://doi.org/10.48550/arXiv.2102. 06514.
[12] Liu Xiaorui, Jin Wei, Ma Yao, et al. Elastic graph neural networks[PP/OL]. V1. arXiv(2021-07-05)[2025-09-30]. https://arxiv.org/abs/2107. 06996.
[13] Li Kuan, Liu Yang, Ao Xiang, et al. Reliable representations make a stronger defender: unsupervised structure refinement for robust GNN[C]//Proceedings of the 28th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2022: 925-935.
[14] Veličković P, Cucurull G, Casanova A, et al. Graph attention networks[EB/OL]. V3. arXiv(2018-02-04)[2025-09-30]. https://arxiv.org/abs/1710. 10903.
[15] Egressy B, Von Niederhäusern L, Blanuša J, et al. Provably powerful graph neural networks for directed multi-graphs[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2024, 38(10): 11838-11846.
[16] Ahmed N, Rossi R A, Zhou Rong. Cora[DS/OL]. [2025-10-10]. http://networkrepository.com/cora.php.
[17] Ahmed N, Rossi R A, Zhou Rong. Citeseer[DS/OL]. [2025-10-10]. http://networkrepository.com/citeseer.php.
[18] Adamic L, Glance N. Polblogs[DS/OL]. [2025-10-10]. http://networkrepository.com/polblogs.php.
[19] Namata G M, London B, Getoor L, et al. PubMed diabetes dataset[DS/OL]. [2025-10-10]. https://linqs.org/datasets/#pubmed-diabetes.
[20] HU Weihua, Fey M, Zitnik M, et al. Dataset ogbn-products[DS/OL]. Open Graph Benchmark, 2020. https://ogb.stanford.edu/docs/nodeprop/#ogbn-products.
[21] Zügner D, Borchert O, Akbarnejad A, et al. Adversarial attacks on graph neural networks: perturbations and their patterns[J]. ACM Transactions on Knowledge Discovery from Data, 2020, 14(5): 1-31.
[22] Waniek M, Michalak T P, Wooldridge M J, et al. Hiding individuals and communities in a social network[J]. Nature Human Behaviour, 2018, 2(2): 139-147.
[23] Madry A, Makelov A, Schmidt L, et al. Towards deep learning models resistant to adversarial attacks[PP/OL]. V4. arXiv(2019-09-04)[2025-10-10]. https://doi.org/10.48550/arXiv.1706.06083.
[24] Goodfellow I J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples[PP/OL]. V3. arXiv(2015-03-20)[2025-09-30]. https://arxiv.org/abs/1412.6572.
[25] Kipf T N, Welling M. Semi-supervised classification with graph convolutional networks[PP/OL]. V4. arXiv(2017-02-22)[2025-09-30]. https://arxiv.org/abs/1609. 02907.
[26] Zhu Dingyuan, Zhang Ziwei, Cui Peng, et al. Robust graph convolutional networks against adversarial attacks[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. New York: ACM, 2019: 1399-1407.
相似文献/References:
[1]路玲,孙新德..基于图像子块DCT系数对的盲检测数字水印[J].郑州大学学报(工学版),2010,31(02):108112.
LU Ling,SUN Xinde.A Blind Detection Digital Watermarking Algorithm Based on Pairs ofBlocks DCT Coefficients[J].Journal of Zhengzhou University (Engineering Science),2010,31(XX):108112.
[2]王珊,谷城..基于归一化自相关语音筛选的鲁棒性说话人确认研究[J].郑州大学学报(工学版),2009,30(03):141.
Wang Shan,GU Cheng.Confirmation Researching on Robustness Speaker based-on NormalizedAutocorrelation Voice Selection/div>[J].Journal of Zhengzhou University (Engineering Science),2009,30(XX):141.
[3]徐振启,卢洵,罗少鹏..基于时空二维混沌的自适应彩色图像水印算法[J].郑州大学学报(工学版),2007,28(02):84.[doi:10.3969/j.issn.1671-6833.2007.02.022]
Xu Zhenqi,Lu Xun,Luo Shaopeng.Adaptive color image watermarking algorithm based on two-dimensional chaos in space and time[J].Journal of Zhengzhou University (Engineering Science),2007,28(XX):84.[doi:10.3969/j.issn.1671-6833.2007.02.022]
[4]谭秀湖,刘国枝,孙旭..基于最小均方差下的3D模型数字水印算法[J].郑州大学学报(工学版),2006,27(04):101.[doi:10.3969/j.issn.1671-6833.2006.04.025]
Tan Xiu Lake,Liu Guozhi,Sun Xu.Digital watermarking algorithm for 3D models based on minimum mean square deviation [J].Journal of Zhengzhou University (Engineering Science),2006,27(XX):101.[doi:10.3969/j.issn.1671-6833.2006.04.025]
[5]吴振龙,李 林,刘艳红.基于全驱控制方法的农机路径跟踪控制[J].郑州大学学报(工学版),2025,46(04):24.[doi:10.13705/j.issn.1671-6833.2025.04.019]
WU Zhenlong,LI Lin,LIU Yanhong.Path Tracking of Agricultural Machinery Based on Fully Actuated Control Approaches[J].Journal of Zhengzhou University (Engineering Science),2025,46(XX):24.[doi:10.13705/j.issn.1671-6833.2025.04.019]
[6]郑红,罗俞建,凌侃,等.多模态跨尺度特征融合的药物靶标亲和力预测[J].郑州大学学报(工学版),2026,47(XX):1.[doi:10.13705/j.issn.1671-6833.2026.04.001]
ZHENG Hong,LUO Yujian,LING Kan,et al.Multimodal Cross-scale Feature Fusion for Drug-Target Affinity Prediction[J].Journal of Zhengzhou University (Engineering Science),2026,47(XX):1.[doi:10.13705/j.issn.1671-6833.2026.04.001]
[7]张淑芬,李涛,张镇博,等.一种抗拜占庭攻击的联邦学习鲁棒聚合算法[J].郑州大学学报(工学版),2027,48(XX):1.[doi:10.13705/j.issn.1671-6833.2026.04.012]
ZHANG Shufen,LI Tao,ZHANG Zhenbo,et al.A Robust Aggregation Algorithm Defending Against Byzantine Attacks in Federated Learning[J].Journal of Zhengzhou University (Engineering Science),2027,48(XX):1.[doi:10.13705/j.issn.1671-6833.2026.04.012]