Graph Transformation

Malicious Internet Entity Detection Using Local Graph Inference

Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07
Algorithm
Graph Transformation
Evaluation Method

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13
Graph Transformation
Security Analysis
Program Analysis

A Robust graph attention network with dynamic adjusted Graph

Authors: Xianchen Zhou, Yaoyun Zeng, Hongxia Wang | Published: 2020-09-28 | Updated: 2022-08-04
Graph Transformation
Poisoning
Relationship between Robustness and Privacy

Adversarial Attack on Large Scale Graph

Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06
Graph Transformation
Adversarial Attack Methods
Structural Attack

GraphReach: Position-Aware Graph Neural Network using Reachability Estimations

Authors: Sunil Nishad, Shubhangi Agarwal, Arnab Bhattacharya, Sayan Ranu | Published: 2020-08-19 | Updated: 2021-08-20
Graph Transformation
Deep Learning
Deep Learning Method

Adversarial Immunization for Certifiable Robustness on Graphs

Authors: Shuchang Tao, Huawei Shen, Qi Cao, Liang Hou, Xueqi Cheng | Published: 2020-07-19 | Updated: 2021-08-25
Graph Transformation
Poisoning
Computational Complexity