Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach
暂无分享,去创建一个
Suhang Wang | Tsung-Yu Hsieh | Vasant G. Honavar | Xianfeng Tang | Yiwei Sun | Vasant G Honavar | Suhang Wang | Yiwei Sun | Xianfeng Tang | Tsung-Yu Hsieh
[1] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[2] Yu Huang,et al. FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System , 2019, WWW.
[3] Wenwu Zhu,et al. Structural Deep Network Embedding , 2016, KDD.
[4] Prasenjit Mitra,et al. Transferring Robustness for Graph Neural Network Against Poisoning Attacks , 2019, WSDM.
[5] Jure Leskovec,et al. Graph Convolutional Neural Networks for Web-Scale Recommender Systems , 2018, KDD.
[6] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[7] Sergey Levine,et al. Adversarial Policies: Attacking Deep Reinforcement Learning , 2019, ICLR.
[8] Kun He,et al. Detecting Overlapping Communities from Local Spectral Subspaces , 2015, 2015 IEEE International Conference on Data Mining.
[9] Suhang Wang,et al. Attacking Graph Convolutional Networks via Rewiring , 2019, ArXiv.
[10] Liming Zhu,et al. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense , 2019 .
[11] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[12] C. Lee Giles,et al. CiteSeer: an automatic citation indexing system , 1998, DL '98.
[13] Le Song,et al. Heterogeneous Graph Neural Networks for Malicious Account Detection , 2018, CIKM.
[14] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..
[15] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[16] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[17] Qi Xuan,et al. Fast Gradient Attack on Network Embedding , 2018, ArXiv.
[18] Charu C. Aggarwal,et al. An Introduction to Social Network Data Analytics , 2011, Social Network Data Analytics.
[19] Huan Sun,et al. CoaCor: Code Annotation for Code Retrieval with Reinforcement Learning , 2019, WWW.
[20] Lihong Li,et al. Adversarial Attacks on Stochastic Bandits , 2018, NeurIPS.
[21] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[22] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[23] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[24] Stephan Gunnemann,et al. Adversarial Attacks on Graph Neural Networks via Meta Learning , 2019, ICLR.
[25] Binghui Wang,et al. Attacking Graph-based Classification via Manipulating the Graph Structure , 2019, CCS.
[26] P. Erdos,et al. On the evolution of random graphs , 1984 .
[27] Chengqi Zhang,et al. Tri-Party Deep Network Representation , 2016, IJCAI.
[28] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[29] Bo An,et al. Securing the Deep Fraud Detector in Large-Scale E-Commerce Platform via Adversarial Machine Learning Approach , 2019, WWW.
[30] Sanja Fidler,et al. NerveNet: Learning Structured Policy with Graph Neural Networks , 2018, ICLR.
[31] Svetha Venkatesh,et al. Graph Transformation Policy Network for Chemical Reaction Prediction , 2018, KDD.
[32] Jiliang Tang,et al. Adversarial Attacks and Defenses in Images, Graphs and Text: A Review , 2019, International Journal of Automation and Computing.
[33] Sergey Levine,et al. Trust Region Policy Optimization , 2015, ICML.
[34] Yuan He,et al. Graph Neural Networks for Social Recommendation , 2019, WWW.
[35] Stephan Günnemann,et al. Deep Gaussian Embedding of Graphs: Unsupervised Inductive Learning via Ranking , 2017, ICLR.
[36] Vasant Honavar,et al. MEGAN: A Generative Adversarial Network for Multi-View Network Embedding , 2019, IJCAI.
[37] Xianfeng Tang,et al. Representation Learning for Large-Scale Dynamic Networks , 2018, DASFAA.
[38] Charu C. Aggarwal,et al. Graph Convolutional Networks with EigenPooling , 2019, KDD.
[39] Stephan Günnemann,et al. NetGAN: Generating Graphs via Random Walks , 2018, ICML.
[40] Andrew McCallum,et al. Automating the Construction of Internet Portals with Machine Learning , 2000, Information Retrieval.
[41] Jun Wang,et al. Real-Time Bidding by Reinforcement Learning in Display Advertising , 2017, WSDM.
[42] Jiafeng Guo,et al. Reinforcement Learning to Rank with Markov Decision Process , 2017, SIGIR.
[43] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[44] Xiaojin Zhu,et al. Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners , 2015, AAAI.
[45] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[46] Lihong Li,et al. Data Poisoning Attacks in Contextual Bandits , 2018, GameSec.
[47] Xin Li,et al. Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network , 2019, WWW.
[48] Roger M. Needham. The changing environment for security protocols , 1997 .
[49] Xavier Bresson,et al. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering , 2016, NIPS.
[50] Jure Leskovec,et al. Graph Convolutional Policy Network for Goal-Directed Molecular Graph Generation , 2018, NeurIPS.
[51] Christopher J. Carpenter,et al. Narcissism on Facebook: Self-promotional and anti-social behavior , 2012 .
[52] Luigi Atzori,et al. Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies , 2015, IEEE Internet of Things Journal.