PATHATTACK: Attacking Shortest Paths in Complex Networks
暂无分享,去创建一个
Yevgeniy Vorobeychik | Wheeler Ruml | Tina Eliassi-Rad | Benjamin A. Miller | Scott Alfeld | Zohair Shafi | Tina Eliassi-Rad | B. A. Miller | Scott Alfeld | Zohair Shafi | Wheeler Ruml | Yevgeniy Vorobeychik
[1] András György,et al. The adversarial stochastic shortest path problem with unknown transition probabilities , 2012, AISTATS.
[2] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[3] William C. Bennett,et al. Author Correction: Imaging and clinical data archive for head and neck squamous cell carcinoma patients treated with radiotherapy , 2018, Scientific Data.
[4] Yevgeniy Vorobeychik,et al. Optimal interdiction of attack plans , 2013, AAMAS.
[5] Nathan R. Sturtevant,et al. Euclidean Heuristic Optimization , 2011, AAAI.
[6] Jörg Hoffmann,et al. Stackelberg Planning: Towards Effective Leader-Follower State Space Search , 2018, AAAI.
[7] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[8] Eduardo Álvarez-Miranda,et al. In-depth data on the network structure and hourly activity of the Central Chilean power grid , 2018, Scientific Data.
[9] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[10] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[11] Jeremy D. Wendt,et al. An Example of Counter-Adversarial Community Detection Analysis , 2018 .
[12] Raffaello D'Andrea,et al. Path Planning for Unmanned Aerial Vehicles in Uncertain and Adversarial Environments , 2003 .
[13] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[14] Hong Cheng,et al. Querying Shortest Path Distance with Bounded Errors in Large Graphs , 2011, SSDBM.
[15] Enrico Nardelli,et al. Finding the most vital node of a shortest path , 2001, Theor. Comput. Sci..
[16] Stephan Günnemann,et al. Certifiable Robustness and Robust Training for Graph Convolutional Networks , 2019, KDD.
[17] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[18] Enrico Nardelli,et al. Finding the most vital node of a shortest path , 2003, Theor. Comput. Sci..
[19] Mihalis Yannakakis,et al. The Complexity of Multiterminal Cuts , 1994, SIAM J. Comput..
[20] Michalis Faloutsos,et al. Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.
[21] Walid Ben-Ameur,et al. A constraint generation algorithm for large scale linear programs using multiple-points separation , 2006, Math. Program..
[22] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[23] Jon M. Kleinberg,et al. Simplicial closure and higher-order link prediction , 2018, Proceedings of the National Academy of Sciences.
[24] Stephan Günnemann,et al. Adversarial Attacks on Node Embeddings via Graph Poisoning , 2018, ICML.