Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
暂无分享,去创建一个
[1] Tommi S. Jaakkola,et al. Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers , 2019, NeurIPS.
[2] Binghui Wang,et al. Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing , 2019, ICLR.
[3] Stephan Günnemann,et al. Adversarial Attacks on Node Embeddings via Graph Poisoning , 2018, ICML.
[4] Suman Jana,et al. Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[5] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[6] Yizheng Chen,et al. Practical Attacks Against Graph-based Clustering , 2017, CCS.
[7] Shishir Nagaraja,et al. The Impact of Unlinkability on Adversarial Community Detection: Effects and Countermeasures , 2010, Privacy Enhancing Technologies.
[8] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[9] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[10] L. Brown,et al. Interval Estimation for a Binomial Proportion , 2001 .
[11] Le Song,et al. Adversarial Attack on Graph Structured Data , 2018, ICML.
[12] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[13] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[14] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[15] Sijia Liu,et al. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective , 2019, IJCAI.
[16] Talal Rahwan,et al. Hiding individuals and communities in a social network , 2016, Nature Human Behaviour.
[17] S. Fortunato,et al. Resolution limit in community detection , 2006, Proceedings of the National Academy of Sciences.
[18] Cho-Jui Hsieh,et al. Towards Robust Neural Networks via Random Self-ensemble , 2017, ECCV.
[19] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[20] Wenwu Zhu,et al. Robust Graph Convolutional Networks Against Adversarial Attacks , 2019, KDD.
[21] Stephan Günnemann,et al. Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.
[22] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[23] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[24] J. Zico Kolter,et al. Certified Adversarial Robustness via Randomized Smoothing , 2019, ICML.
[25] Stephan Günnemann,et al. Certifiable Robustness and Robust Training for Graph Convolutional Networks , 2019, KDD.
[26] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[27] Xiaoyu Cao,et al. Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification , 2017, ACSAC.
[28] Swarat Chaudhuri,et al. AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[29] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[30] HighWire Press. Philosophical transactions of the Royal Society of London. Series A, Containing papers of a mathematical or physical character , 1896 .
[31] Valeria Fionda,et al. Community Deception or: How to Stop Fearing Community Detection Algorithms , 2018, IEEE Transactions on Knowledge and Data Engineering.
[32] Stephan Günnemann,et al. Certifiable Robustness to Graph Perturbations , 2019, NeurIPS.
[33] Chih-Hong Cheng,et al. Maximum Resilience of Artificial Neural Networks , 2017, ATVA.
[34] Jure Leskovec,et al. Defining and evaluating network communities based on ground-truth , 2012, Knowledge and Information Systems.
[35] Inderjit S. Dhillon,et al. Towards Fast Computation of Certified Robustness for ReLU Networks , 2018, ICML.
[36] Bernd Becker,et al. Towards Verification of Artificial Neural Networks , 2015, MBMV.
[37] Stephan Gunnemann,et al. Adversarial Attacks on Graph Neural Networks via Meta Learning , 2019, ICLR.
[38] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .
[39] Binghui Wang,et al. Attacking Graph-based Classification via Manipulating the Graph Structure , 2019, CCS.
[40] Liming Zhu,et al. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense , 2019 .
[41] Jure Leskovec,et al. Empirical comparison of algorithms for network community detection , 2010, WWW '10.
[42] Aditi Raghunathan,et al. Certified Defenses against Adversarial Examples , 2018, ICLR.
[43] Qi Xuan,et al. GA-Based Q-Attack on Community Detection , 2018, IEEE Transactions on Computational Social Systems.
[44] Jure Leskovec,et al. Statistical properties of community structure in large social and information networks , 2008, WWW.