ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.07933
  4. Cited By
Adversarial Attack on Community Detection by Hiding Individuals

Adversarial Attack on Community Detection by Hiding Individuals

22 January 2020
Jia Li
Honglei Zhang
Zhichao Han
Yu Rong
Hong Cheng
Junzhou Huang
    AAML
ArXivPDFHTML

Papers citing "Adversarial Attack on Community Detection by Hiding Individuals"

22 / 22 papers shown
Title
AMNCutter: Affinity-Attention-Guided Multi-View Normalized Cutter for
  Unsupervised Surgical Instrument Segmentation
AMNCutter: Affinity-Attention-Guided Multi-View Normalized Cutter for Unsupervised Surgical Instrument Segmentation
Mingyu Sheng
Jianan Fan
Dongnan Liu
Ron Kikinis
Weidong Cai
39
0
0
06 Nov 2024
Expander Hierarchies for Normalized Cuts on Graphs
Expander Hierarchies for Normalized Cuts on Graphs
Kathrin Hanauer
Monika Henzinger
Robin Münk
Harald Räcke
Maximilian Vötsch
20
0
0
20 Jun 2024
Rethinking Independent Cross-Entropy Loss For Graph-Structured Data
Rethinking Independent Cross-Entropy Loss For Graph-Structured Data
Rui Miao
Kaixiong Zhou
Yili Wang
Ninghao Liu
Ying Wang
Xin Wang
42
4
0
24 May 2024
Safety in Graph Machine Learning: Threats and Safeguards
Safety in Graph Machine Learning: Threats and Safeguards
Song Wang
Yushun Dong
Binchi Zhang
Zihan Chen
Xingbo Fu
Yinhan He
Cong Shen
Chuxu Zhang
Nitesh V. Chawla
Wenlin Yao
45
7
0
17 May 2024
Single Node Injection Label Specificity Attack on Graph Neural Networks
  via Reinforcement Learning
Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning
Dayuan Chen
Jian Zhang
Yuqian Lv
Jinhuan Wang
Hongjie Ni
Shanqing Yu
Zhen Wang
Qi Xuan
AAML
23
3
0
04 May 2023
Turning Strengths into Weaknesses: A Certified Robustness Inspired
  Attack Framework against Graph Neural Networks
Turning Strengths into Weaknesses: A Certified Robustness Inspired Attack Framework against Graph Neural Networks
Binghui Wang
Meng Pang
Yun Dong
AAML
13
14
0
10 Mar 2023
Resisting Graph Adversarial Attack via Cooperative Homophilous
  Augmentation
Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation
Zhihao Zhu
Chenwang Wu
Mingyang Zhou
Hao Liao
DefuLian
Enhong Chen
AAML
11
4
0
15 Nov 2022
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node
  Classification
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification
Yulin Zhu
Liang Tong
Gaolei Li
Xiapu Luo
Kai Zhou
33
4
0
25 Oct 2022
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social
  Networks
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks
Yulin Zhu
Tomasz P. Michalak
Xiapu Luo
Xiaoge Zhang
Kai Zhou
AAML
28
0
0
27 Jun 2022
Bandits for Structure Perturbation-based Black-box Attacks to Graph
  Neural Networks with Theoretical Guarantees
Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Binghui Wang
Youqin Li
Pan Zhou
AAML
34
13
0
07 May 2022
An Adversarial Attack Analysis on Malicious Advertisement URL Detection
  Framework
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Ehsan Nowroozi
A. Abhishek
Mohammadreza Mohammadi
Mauro Conti
AAML
41
30
0
27 Apr 2022
Neighboring Backdoor Attacks on Graph Convolutional Network
Neighboring Backdoor Attacks on Graph Convolutional Network
Liang Chen
Qibiao Peng
Jintang Li
Yang Liu
Jiawei Chen
Yong Li
Zibin Zheng
GNN
AAML
32
11
0
17 Jan 2022
Task and Model Agnostic Adversarial Attack on Graph Neural Networks
Task and Model Agnostic Adversarial Attack on Graph Neural Networks
Kartik Sharma
S. Verma
Sourav Medya
Arnab Bhattacharya
Sayan Ranu
AAML
21
8
0
25 Dec 2021
Surrogate Representation Learning with Isometric Mapping for Gray-box
  Graph Adversarial Attacks
Surrogate Representation Learning with Isometric Mapping for Gray-box Graph Adversarial Attacks
Zihan Liu
Yun Luo
Z. Zang
Stan Z. Li
AAML
15
15
0
20 Oct 2021
How does Heterophily Impact the Robustness of Graph Neural Networks?
  Theoretical Connections and Practical Implications
How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications
Jiong Zhu
Junchen Jin
Donald Loveland
Michael T. Schaub
Danai Koutra
AAML
32
35
0
14 Jun 2021
Generative Adversarial Networks: A Survey Towards Private and Secure
  Applications
Generative Adversarial Networks: A Survey Towards Private and Secure Applications
Zhipeng Cai
Zuobin Xiong
Honghui Xu
Peng-Shuai Wang
Wei Li
Yi-Lun Pan
24
139
0
07 Jun 2021
Mask-GVAE: Blind Denoising Graphs via Partition
Mask-GVAE: Blind Denoising Graphs via Partition
Jia Li
Mengzhou Liu
Honglei Zhang
Pengyun Wang
Yong Wen
Lujia Pan
Hong Cheng
21
9
0
08 Feb 2021
Model Extraction Attacks on Graph Neural Networks: Taxonomy and
  Realization
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Bang Wu
Xiangwen Yang
Shirui Pan
Xingliang Yuan
MIACV
MLAU
55
53
0
24 Oct 2020
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to
  Any-Layer Graph Neural Networks via Influence Function
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function
Binghui Wang
Tianxiang Zhou
Min-Bin Lin
Pan Zhou
Ang Li
Meng Pang
H. Li
Yiran Chen
AAML
21
18
0
01 Sep 2020
GraphReach: Position-Aware Graph Neural Network using Reachability
  Estimations
GraphReach: Position-Aware Graph Neural Network using Reachability Estimations
Sunil Nishad
Shubhangi Agarwal
A. Bhattacharya
Sayan Ranu
GNN
6
20
0
19 Aug 2020
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and
  Empirical Studies
Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies
Wei Jin
Yaxin Li
Han Xu
Yiqi Wang
Shuiwang Ji
Charu C. Aggarwal
Jiliang Tang
AAML
GNN
24
102
0
02 Mar 2020
Adversarial Attack and Defense on Graph Data: A Survey
Adversarial Attack and Defense on Graph Data: A Survey
Lichao Sun
Yingtong Dou
Carl Yang
Ji Wang
Yixin Liu
Philip S. Yu
Lifang He
Yangqiu Song
GNN
AAML
18
273
0
26 Dec 2018
1