Chen, Y., Bin, Z., & Zhao, H. Stealthy graph backdoor attack based on feature trigger. Springer.
Chicago Style (17th ed.) CitationChen, Yang, Zhou Bin, and Haixing Zhao. Stealthy Graph Backdoor Attack Based on Feature Trigger. Springer.
MLA (9th ed.) CitationChen, Yang, et al. Stealthy Graph Backdoor Attack Based on Feature Trigger. Springer.
Warning: These citations may not always be 100% accurate.