Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure
暂无分享,去创建一个
[1] Yuan Luo,et al. Graph Convolutional Networks for Text Classification , 2018, AAAI.
[2] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[3] Liming Zhu,et al. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense , 2019 .
[4] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[5] Zhipeng Cai,et al. Trading Private Range Counting over Big IoT Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[6] Zhipeng Cai,et al. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.
[7] Hong Cheng,et al. Semi-Supervised Graph Classification: A Hierarchical Graph Perspective , 2019, WWW.
[8] Zhipeng Cai,et al. Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.
[9] Wenbing Huang,et al. A Restricted Black-Box Adversarial Framework Towards Attacking Graph Embedding Models , 2019, AAAI.
[10] Talal Rahwan,et al. Hiding individuals and communities in a social network , 2016, Nature Human Behaviour.
[11] Kevin Chen-Chuan Chang,et al. A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications , 2017, IEEE Transactions on Knowledge and Data Engineering.