暂无分享,去创建一个
Vasant Honavar | Xianfeng Tang | Suhang Wang | Tsung-Yu Hsieh | Yiwei Sun | Vasant G Honavar | Suhang Wang | Yiwei Sun | Xianfeng Tang | Tsung-Yu Hsieh
[1] Claudia Eckert,et al. Is Feature Selection Secure against Training Data Poisoning? , 2015, ICML.
[2] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[3] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[4] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[5] B. Bollobás. The evolution of random graphs , 1984 .
[6] Graham Cormode,et al. Node Classification in Social Networks , 2011, Social Network Data Analytics.
[7] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[8] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[9] Sergey Levine,et al. Adversarial Policies: Attacking Deep Reinforcement Learning , 2019, ICLR.
[10] Sergey Levine,et al. Trust Region Policy Optimization , 2015, ICML.
[11] Qi Xuan,et al. Fast Gradient Attack on Network Embedding , 2018, ArXiv.
[12] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.
[13] Lihong Li,et al. Adversarial Attacks on Stochastic Bandits , 2018, NeurIPS.
[14] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[15] Stephan Günnemann,et al. NetGAN: Generating Graphs via Random Walks , 2018, ICML.
[16] Charu C. Aggarwal,et al. An Introduction to Social Network Data Analytics , 2011, Social Network Data Analytics.
[17] Wenwu Zhu,et al. Structural Deep Network Embedding , 2016, KDD.
[18] Jiafeng Guo,et al. Reinforcement Learning to Rank with Markov Decision Process , 2017, SIGIR.
[19] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[20] Yevgeniy Vorobeychik,et al. Data Poisoning Attacks on Factorization-Based Collaborative Filtering , 2016, NIPS.
[21] Alex M. Andrew,et al. Reinforcement Learning: : An Introduction , 1998 .
[22] Stephan Günnemann,et al. Deep Gaussian Embedding of Graphs: Unsupervised Inductive Learning via Ranking , 2017, ICLR.
[23] M. Gentzkow,et al. Social Media and Fake News in the 2016 Election , 2017 .
[24] Liming Zhu,et al. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense , 2019 .
[25] Ke Zhang,et al. Tri-party deep network representation learning using inductive matrix completion , 2019 .
[26] Xiaojin Zhu,et al. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners , 2015, AAAI.
[27] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[28] P. Erdos,et al. On the evolution of random graphs , 1984 .
[29] Jure Leskovec,et al. Graph Convolutional Policy Network for Goal-Directed Molecular Graph Generation , 2018, NeurIPS.
[30] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[31] Svetha Venkatesh,et al. Graph Transformation Policy Network for Chemical Reaction Prediction , 2018, KDD.
[32] Stephan Günnemann,et al. Adversarial Attacks on Graph Neural Networks via Meta Learning , 2019, ICLR.
[33] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[34] C. Lee Giles,et al. CiteSeer: an automatic citation indexing system , 1998, DL '98.
[35] Andrew McCallum,et al. Automating the Construction of Internet Portals with Machine Learning , 2000, Information Retrieval.
[36] Jun Wang,et al. Real-Time Bidding by Reinforcement Learning in Display Advertising , 2017, WSDM.
[37] Lihong Li,et al. Data Poisoning Attacks in Contextual Bandits , 2018, GameSec.