Graph Adversarial Attack via Rewiring
暂无分享,去创建一个
Jiliang Tang | Yao Ma | Lingfei Wu | Tyler Derr | Suhang Wang | Jiliang Tang | Lingfei Wu | Tyler Derr | Yao Ma | Suhang Wang
[1] Jure Leskovec,et al. Evolution of resilience in protein interactomes across the tree of life , 2018, Proceedings of the National Academy of Sciences.
[2] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[3] Pascal Frossard,et al. The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains , 2012, IEEE Signal Processing Magazine.
[4] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[5] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[6] Michael William Newman,et al. The Laplacian spectrum of graphs , 2001 .
[7] Leman Akoglu,et al. Optimizing network robustness by edge rewiring: a general framework , 2016, Data Mining and Knowledge Discovery.
[8] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[9] Rok Sosic,et al. Evolution of resilience in protein interactomes across the tree of life , 2018, Proceedings of the National Academy of Sciences.
[10] V. N. Bogaevski,et al. Matrix Perturbation Theory , 1991 .
[11] Philip S. Yu,et al. Adversarial Attack and Defense on Graph Data: A Survey , 2018 .
[12] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[13] Xavier Bresson,et al. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering , 2016, NIPS.
[14] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[15] José M. F. Moura,et al. Discrete Signal Processing on Graphs: Frequency Analysis , 2013, IEEE Transactions on Signal Processing.
[16] M. Fiedler. Algebraic connectivity of graphs , 1973 .
[17] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[18] Cho-Jui Hsieh,et al. Attack Graph Convolutional Networks by Adding Fake Nodes , 2018, ArXiv.
[19] Yixin Chen,et al. An End-to-End Deep Learning Architecture for Graph Classification , 2018, AAAI.
[20] Evgueni A. Haroutunian,et al. Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.
[21] Stephan Günnemann,et al. Adversarial Attacks on Node Embeddings via Graph Poisoning , 2018, ICML.
[22] Stephan Gunnemann,et al. Adversarial Attacks on Graph Neural Networks via Meta Learning , 2019, ICLR.
[23] Jure Leskovec,et al. Hierarchical Graph Representation Learning with Differentiable Pooling , 2018, NeurIPS.
[24] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[25] Pinar Yanardag,et al. Deep Graph Kernels , 2015, KDD.
[26] Jure Leskovec,et al. Inductive Representation Learning on Large Graphs , 2017, NIPS.
[27] Jiliang Tang,et al. Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study , 2020, ArXiv.
[28] Vasant Honavar,et al. Node Injection Attacks on Graphs via Reinforcement Learning , 2019, ArXiv.
[29] Stephen P. Boyd,et al. Growing Well-connected Graphs , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[30] Joan Bruna,et al. Spectral Networks and Locally Connected Networks on Graphs , 2013, ICLR.
[31] Alexander J. Gomez,et al. Improving Robustness to Attacks Against Vertex Classification , 2019 .
[32] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.