Privacy-Preserving Graph Embedding based on Local Differential Privacy Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04 Graph EmbeddingPrivacy Protection MethodPrivacy Technique 2023.10.17 2025.05.28 Literature Database
Graph Mining for Cybersecurity: A Survey Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16 Graph EmbeddingGraph ConstructionSecurity Analysis 2023.04.02 2025.05.28 Literature Database
A Survey on Malware Detection with Graph Representation Learning Authors: Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui | Published: 2023-03-28 | Updated: 2023-08-17 Graph EmbeddingPoisoningMalware Classification 2023.03.28 2025.05.28 Literature Database
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification Authors: Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu | Published: 2018-12-10 | Updated: 2019-05-09 Graph EmbeddingData CollectionMalware Detection Method 2018.12.10 2025.05.28 Literature Database