暂无分享,去创建一个
Mingjie Sun | Dawn Xiaodong Song | Bo Li | Jian Tang | Yao Chen | Chaowei Xiao | Huichen Li | D. Song | Jian Tang | Mingjie Sun | Chaowei Xiao | Bo Li | Huichen Li | Yao Chen
[1] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[2] Mingyan Liu,et al. Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation , 2018, ECCV.
[3] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[4] Bo Li,et al. MeshAdv: Adversarial Meshes for Visual Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Lise Getoor,et al. Collective Classification in Network Data , 2008, AI Mag..
[6] Moustapha Cissé,et al. Houdini: Fooling Deep Structured Prediction Models , 2017, ArXiv.
[7] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[8] C. Lee Giles,et al. CiteSeer: an automatic citation indexing system , 1998, DL '98.
[9] Huan Liu,et al. Leveraging social media networks for classification , 2011, Data Mining and Knowledge Discovery.
[10] Max Welling,et al. Variational Graph Auto-Encoders , 2016, ArXiv.
[11] Stanford,et al. Learning to Discover Social Circles in Ego Networks , 2012 .
[12] Jian Li,et al. Network Embedding as Matrix Factorization: Unifying DeepWalk, LINE, PTE, and node2vec , 2017, WSDM.
[13] Mingyan Liu,et al. Spatially Transformed Adversarial Examples , 2018, ICLR.
[14] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[15] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[16] Yevgeniy Vorobeychik,et al. Data Poisoning Attacks on Factorization-Based Collaborative Filtering , 2016, NIPS.
[17] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[19] Jinfeng Yi,et al. Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples , 2018, AAAI.
[20] Mingzhe Wang,et al. LINE: Large-scale Information Network Embedding , 2015, WWW.
[21] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[22] Omer Levy,et al. Neural Word Embedding as Implicit Matrix Factorization , 2014, NIPS.
[23] Jingzhou Liu,et al. Visualization Large-scale and High-dimensional Data , 2016, arXiv.org.
[24] Mingyan Liu,et al. Realistic Adversarial Examples in 3D Meshes , 2018, ArXiv.
[25] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[26] Jure Leskovec,et al. node2vec: Scalable Feature Learning for Networks , 2016, KDD.
[27] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[28] Ashish Goel,et al. Fast Incremental and Personalized PageRank , 2010, Proc. VLDB Endow..
[29] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[30] Mingyan Liu,et al. Generating Adversarial Examples with Adversarial Networks , 2018, IJCAI.
[31] Jie Tang,et al. ArnetMiner: extraction and mining of academic social networks , 2008, KDD.