CCNI Workshop

The 9th Workshop on Graph Techniques for Adversarial Activity Analytics (GTA³ 2025)

November 12, 2025 | Washington DC, USA

For past GTA3 workshops, please visit our archive page.

In conjunction with the 25th IEEE International Conference on Data Mining ( ICDM)

Workshop Summary

Graphs are powerful analytic tools for modeling adversarial activities across a wide range of domains and applications. Examples include identifying and responding to cybersecurity systems' threats and vulnerabilities, strengthening critical infrastructure's resilience and robustness, and combating covert illicit activities that span various domains like finance, communication, and transportation. With the rapid development of generative AI, the lifecycle and throughput of adversarial activities, such as generating attacks or synthesizing deceptive signals, have accelerated significantly. For instance, a malicious actor can generate many malware variants to flood defense systems or create agents to disseminate misleading signals, obscuring their activities. Consequently, there is a pressing need for novel and effective technology to autonomously handle these adversarial activities and keep pace with the evolving threats. The purpose of this workshop is to provide a forum to discuss emerging research problems and novel approaches in graph analysis for modeling adversarial activities in the age of generative AI.

Theme and Topics

Adversarial activities are often covert and embedded across multiple domains, making them generally undetectable and unrecognizable when viewed in isolation. They only become apparent when analyzed jointly across these domains. Therefore, a main research focus on modeling adversarial activities is developing techniques to fuse information from different networks into a unified view for comprehensive analysis. Equally important is the detection and matching of indicative patterns to recognize underlying adversarial activities within activity networks or graphs. Additionally, sophisticated adversarial actions may involve attempts to cover their tracks by attacking and altering networks, which has led to interest in attacking graph machine learning models. This, in turn, drives the development of robust models resilient to such attacks. The goal of the workshop is to address three fundamental problems in graph-based adversarial activity analytics: "Connecting the Dots," "Finding a Needle in a Haystack," and "Defending Against Attacks." In particular, with the advent of generative AI, we aim to augment state-of-the-art techniques and tackle these challenges in this new era.

In addition to analyzing activity networks, knowledge graphs play an important role in adversarial activity analysis. They provide the benefits of contextualizing and correlating information based on facts, enhancing the ability to detect and understand complex adversarial patterns. For instance, in the context of cybersecurity, knowledge graphs can help attribute attacks to specific threat actors by linking patterns of behavior, tools, and techniques to known profiles of adversaries. Similarly, in financial systems, knowledge graphs can be used to detect fraudulent activities by connecting transactions, accounts, and entities to identify unusual patterns indicative of fraud.

Topics of Interest

Including but not limited to:

  • Graph alignment and data integration from multiple heterogeneous domains
  • Subgraph detection and discovery algorithms for large networks
  • Attack and defense strategies on graph models (e.g., GNNs)
  • Generative models for synthesizing realistic networks (e.g., static, dynamic, etc.)
  • Representation learning on graphs
  • Multilayer and multiplex networks
  • High-performance graph computing
  • Explainability of graph models (e.g., GNNs)
  • Limits of detectability and identifiability
  • Link prediction and recommendation
  • Information diffusion and influence maximization
  • New methods for clustering and ranking on graphs
  • Novel datasets and evaluation metrics for network analytics
  • Knowledge graph creation, mining, and applications
  • Knowledge graph completion and reasoning
  • Complex anomaly detection and interpretation
  • Summarization and visualization of large networks
  • Interactive graph search and exploration
  • Topological analysis (e.g., motif analysis) on large graphs
  • Game-theoretic approach for adversarial modeling on graphs
  • Graph-based semi-supervised learning, active learning, and transfer learning
  • Frontiers of graph machine learning for adversarial activities analytics
  • Large language models and generative AI for adversarial activities.
  • Weakly supervised and self-supervised anomaly detection.
  • Fairness, explainability and privacy in adversarial activities analytics.
  • Benchmarks for adversarial activities analytics.

Submission Instructions

Submissions to the workshop will be subject to a double-blind peer review process, with each submission reviewed by at least two program committee members and an organizer. Submissions will be evaluated based on their relevance to the workshop, scientific novelty, and technical quality. Accepted papers will be given a presentation slot in the workshop and will be included in the ICDM Workshop Proceedings.

We accept two types of submissions: short papers (up to 6 pages) describing work in progress and full papers (up to 10 pages) presenting mature work. All submissions must follow the two-column IEEE format. More details are available on the IEEE ICDM 2025 Submission Guidelines page. Please submit your manuscript through the GTA3 2025 online submission system.


Important Dates

  • + Workshop paper submission: Aug 29, 2025
  • + Notification of workshop paper acceptance: Sep 15, 2025
  • + Camera-ready submission deadline: Sep 25, 2025
  • + Workshop date:Nov 12, 2025 (tentative)

Keynote Speakers

We plan to invite 3 ~ 4 speakers who are experts in relevant research areas.

Program Committee

  • Abhishek Saini (Rutgers University)
  • Dana Warmsley (HRL Laboratories)
  • Fan H Hung (HRL Laboratories)
  • Haolin Jiang (Rutgers University)
  • Haosheng Yang (Rutgers University)
  • Harry Shomer (University of Texas at Arlington)
  • Kang-Yu Ni (HRL Laboratories)
  • Kevin Martin (HRL Laboratories)
  • Nigel Stepp (HRL Laboratories)
  • Qi Yu (University of Illinois Urbana-Champaign)
  • Rodolfo Valiente Romero (HRL Laboratories)
  • Sam Johnson (HRL Laboratories)
  • Tyler Derr (Vanderbilt University)
  • Wei Jin (Emory University)
  • Wenqi Fan (The Hong Kong Polytechnic University)
  • Xiaorui Liu (North Carolina State University)
  • Yao Ma (Rensselaer Polytechnic Institute )
  • Zhichen Zeng (University of Illinois Urbana-Champaign)

Program Chairs (Organizers)