Graph Structure Learning for Robust Graph Neural Networks
暂无分享,去创建一个
Suhang Wang | Jiliang Tang | Xiaorui Liu | Wei Jin | Xianfeng Tang | Yao Ma | Xiaorui Liu | Jiliang Tang | Suhang Wang | Wei Jin | Yao Ma | Xianfeng Tang
[1] Max Welling,et al. Variational Graph Auto-Encoders , 2016, ArXiv.
[2] Suhang Wang,et al. Attacking Graph Convolutional Networks via Rewiring , 2019, ArXiv.
[3] Zhiyuan Liu,et al. Graph Neural Networks: A Review of Methods and Applications , 2018, AI Open.
[4] Donald F. Towsley,et al. Diffusion-Convolutional Neural Networks , 2015, NIPS.
[5] Philip S. Yu,et al. A Comprehensive Survey on Graph Neural Networks , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[6] Stephan Günnemann,et al. Adversarial Attacks on Node Embeddings via Graph Poisoning , 2018, ICML.
[7] Santo Fortunato,et al. Community detection in graphs , 2009, ArXiv.
[8] Kilian Q. Weinberger,et al. Simplifying Graph Convolutional Networks , 2019, ICML.
[9] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[10] Jiliang Tang,et al. DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses , 2020, ArXiv.
[11] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[12] Stephan Gunnemann,et al. Adversarial Attacks on Graph Neural Networks via Meta Learning , 2019, ICLR.
[13] Cao Xiao,et al. FastGCN: Fast Learning with Graph Convolutional Networks via Importance Sampling , 2018, ICLR.
[14] Prasenjit Mitra,et al. Transferring Robustness for Graph Neural Network Against Poisoning Attacks , 2019, WSDM.
[15] Jure Leskovec,et al. Inductive Representation Learning on Large Graphs , 2017, NIPS.
[16] Liming Zhu,et al. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense , 2019 .
[17] Tong Zhang,et al. Learning on Graph with Laplacian Regularization , 2006, NIPS.
[18] Saba A. Al-Sayouri,et al. All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs , 2020, WSDM.
[19] Stephan Gunnemann,et al. Certifiable Robustness and Robust Training for Graph Convolutional Networks , 2019, Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.
[20] V. Koltchinskii,et al. Nuclear norm penalization and optimal rates for noisy low rank matrix completion , 2010, 1011.6256.
[21] Liwen Vaughan,et al. Why are Websites co-linked? The case of Canadian universities , 2007, Scientometrics.
[22] Patrick L. Combettes,et al. Proximal Splitting Methods in Signal Processing , 2009, Fixed-Point Algorithms for Inverse Problems in Science and Engineering.
[23] Richard S. Zemel,et al. Gated Graph Sequence Neural Networks , 2015, ICLR.
[24] Pietro Liò,et al. Graph Attention Networks , 2017, ICLR.
[25] Jiliang Tang,et al. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study , 2020, ArXiv.
[26] Wenwu Zhu,et al. Robust Graph Convolutional Networks Against Adversarial Attacks , 2019, KDD.
[27] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[28] Xavier Bresson,et al. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering , 2016, NIPS.
[29] Jure Leskovec,et al. Graph Convolutional Neural Networks for Web-Scale Recommender Systems , 2018, KDD.
[30] Bin Luo,et al. Semi-Supervised Learning With Graph Learning-Convolutional Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[31] Samuel S. Schoenholz,et al. Neural Message Passing for Quantum Chemistry , 2017, ICML.
[32] Mohamed-Jalal Fadili,et al. A Generalized Forward-Backward Splitting , 2011, SIAM J. Imaging Sci..
[33] Emmanuel J. Candès,et al. Exact Matrix Completion via Convex Optimization , 2008, Found. Comput. Math..
[34] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[35] Marc Teboulle,et al. A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems , 2009, SIAM J. Imaging Sci..
[36] Joan Bruna,et al. Spectral Networks and Locally Connected Networks on Graphs , 2013, ICLR.
[37] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[38] Nicolas Vayatis,et al. Estimation of Simultaneously Sparse and Low Rank Matrices , 2012, ICML.
[39] Razvan Pascanu,et al. Relational inductive biases, deep learning, and graph networks , 2018, ArXiv.
[40] Le Song,et al. Learning Social Infectivity in Sparse Low-rank Networks Using Multi-dimensional Hawkes Processes , 2013, AISTATS.
[41] Cho-Jui Hsieh,et al. A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning , 2019, NeurIPS.