ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1903.00553
  4. Cited By
Attacking Graph-based Classification via Manipulating the Graph
  Structure

Attacking Graph-based Classification via Manipulating the Graph Structure

1 March 2019
Binghui Wang
Neil Zhenqiang Gong
    AAML
ArXivPDFHTML

Papers citing "Attacking Graph-based Classification via Manipulating the Graph Structure"

25 / 75 papers shown
Title
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
Xiaoyu Cao
Minghong Fang
Jia Liu
Neil Zhenqiang Gong
FedML
117
614
0
27 Dec 2020
Blindfolded Attackers Still Threatening: Strict Black-Box Adversarial
  Attacks on Graphs
Blindfolded Attackers Still Threatening: Strict Black-Box Adversarial Attacks on Graphs
Jiarong Xu
Yizhou Sun
Xin Jiang
Yanhao Wang
Yang Yang
Chunping Wang
Jiangang Lu
AAML
37
14
0
12 Dec 2020
Morshed: Guiding Behavioral Decision-Makers towards Better Security
  Investment in Interdependent Systems
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems
Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh Ardabili
Issa M. Khalil
T. Cason
S. Sundaram
S. Bagchi
20
17
0
12 Nov 2020
BaFFLe: Backdoor detection via Feedback-based Federated Learning
BaFFLe: Backdoor detection via Feedback-based Federated Learning
Sébastien Andreina
G. Marson
Helen Möllering
Ghassan O. Karame
FedML
29
138
0
04 Nov 2020
Model Extraction Attacks on Graph Neural Networks: Taxonomy and
  Realization
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Bang Wu
Xiangwen Yang
Shirui Pan
Xingliang Yuan
MIACV
MLAU
55
53
0
24 Oct 2020
Semantic-preserving Reinforcement Learning Attack Against Graph Neural
  Networks for Malware Detection
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection
Lan Zhang
Peng Liu
Yoon-Ho Choi
Ping Chen
AAML
30
37
0
11 Sep 2020
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to
  Any-Layer Graph Neural Networks via Influence Function
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function
Binghui Wang
Tianxiang Zhou
Min Lin
Pan Zhou
Ang Li
Meng Pang
H. Li
Yiran Chen
AAML
24
18
0
01 Sep 2020
Reinforcement Learning-based Black-Box Evasion Attacks to Link
  Prediction in Dynamic Graphs
Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs
Houxiang Fan
Binghui Wang
Pan Zhou
Ang Li
Meng Pang
Zichuan Xu
Cai Fu
H. Li
Yiran Chen
AAML
MLAU
19
16
0
01 Sep 2020
SIGL: Securing Software Installations Through Deep Graph Learning
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
26
49
0
26 Aug 2020
Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks
Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks
Jinyuan Jia
Xiaoyu Cao
Neil Zhenqiang Gong
SILM
16
128
0
11 Aug 2020
With Great Dispersion Comes Greater Resilience: Efficient Poisoning
  Attacks and Defenses for Linear Regression Models
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models
Jialin Wen
Benjamin Zi Hao Zhao
Minhui Xue
Alina Oprea
Hai-feng Qian
AAML
16
19
0
21 Jun 2020
Graph Backdoor
Graph Backdoor
Zhaohan Xi
Ren Pang
S. Ji
Ting Wang
AI4CE
AAML
25
163
0
21 Jun 2020
Backdoor Attacks to Graph Neural Networks
Backdoor Attacks to Graph Neural Networks
Zaixi Zhang
Jinyuan Jia
Binghui Wang
Neil Zhenqiang Gong
GNN
24
212
0
19 Jun 2020
DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a
  Variational Graph Autoencoder
DefenseVGAE: Defending against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder
Ao Zhang
Jinwen Ma
AAML
GNN
24
22
0
16 Jun 2020
Robust Spammer Detection by Nash Reinforcement Learning
Robust Spammer Detection by Nash Reinforcement Learning
Yingtong Dou
Guixiang Ma
Philip S. Yu
Sihong Xie
AAML
16
58
0
10 Jun 2020
Adversarial Attack on Hierarchical Graph Pooling Neural Networks
Adversarial Attack on Hierarchical Graph Pooling Neural Networks
Haoteng Tang
Guixiang Ma
Yurong Chen
Lei Guo
Wei Wang
Bo Zeng
Liang Zhan
AAML
29
28
0
23 May 2020
AN-GCN: An Anonymous Graph Convolutional Network Defense Against
  Edge-Perturbing Attack
AN-GCN: An Anonymous Graph Convolutional Network Defense Against Edge-Perturbing Attack
Ao Liu
Beibei Li
Tao Li
Pan Zhou
Rui Wang
AAML
27
0
0
06 May 2020
A Survey of Adversarial Learning on Graphs
A Survey of Adversarial Learning on Graphs
Liang Chen
Jintang Li
Jiaying Peng
Tao Xie
Zengxu Cao
Kun Xu
Xiangnan He
Zibin Zheng
Bingzhe Wu
AAML
18
84
0
10 Mar 2020
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and
  Empirical Studies
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies
Wei Jin
Yaxin Li
Han Xu
Yiqi Wang
Shuiwang Ji
Charu C. Aggarwal
Jiliang Tang
AAML
GNN
32
103
0
02 Mar 2020
Influence Function based Data Poisoning Attacks to Top-N Recommender
  Systems
Influence Function based Data Poisoning Attacks to Top-N Recommender Systems
Minghong Fang
Neil Zhenqiang Gong
Jia-Wei Liu
TDI
13
154
0
19 Feb 2020
Certified Robustness of Community Detection against Adversarial
  Structural Perturbation via Randomized Smoothing
Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
Jinyuan Jia
Binghui Wang
Xiaoyu Cao
Neil Zhenqiang Gong
AAML
83
83
0
09 Feb 2020
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Minghong Fang
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAML
OOD
FedML
48
1,075
0
26 Nov 2019
Data Poisoning Attacks to Local Differential Privacy Protocols
Data Poisoning Attacks to Local Differential Privacy Protocols
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
AAML
33
76
0
05 Nov 2019
Adversarial Attack and Defense on Graph Data: A Survey
Adversarial Attack and Defense on Graph Data: A Survey
Lichao Sun
Yingtong Dou
Carl Yang
Ji Wang
Yixin Liu
Philip S. Yu
Lifang He
Yangqiu Song
GNN
AAML
23
275
0
26 Dec 2018
Model-Reuse Attacks on Deep Learning Systems
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
134
186
0
02 Dec 2018
Previous
12