Malicious Internet Entity Detection Using Local Graph Inference Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07 AlgorithmGraph TransformationEvaluation Method 2024.08.06 2025.05.27 Literature Database
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13 Graph TransformationSecurity AnalysisProgram Analysis 2023.12.13 2025.05.28 Literature Database
A Robust graph attention network with dynamic adjusted Graph Authors: Xianchen Zhou, Yaoyun Zeng, Hongxia Wang | Published: 2020-09-28 | Updated: 2022-08-04 Graph TransformationPoisoningRelationship between Robustness and Privacy 2020.09.28 2025.05.28 Literature Database
Adversarial Attack on Large Scale Graph Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06 Graph TransformationAdversarial Attack MethodsStructural Attack 2020.09.08 2025.05.28 Literature Database
GraphReach: Position-Aware Graph Neural Network using Reachability Estimations Authors: Sunil Nishad, Shubhangi Agarwal, Arnab Bhattacharya, Sayan Ranu | Published: 2020-08-19 | Updated: 2021-08-20 Graph TransformationDeep LearningDeep Learning Method 2020.08.19 2025.05.28 Literature Database
Adversarial Immunization for Certifiable Robustness on Graphs Authors: Shuchang Tao, Huawei Shen, Qi Cao, Liang Hou, Xueqi Cheng | Published: 2020-07-19 | Updated: 2021-08-25 Graph TransformationPoisoningComputational Complexity 2020.07.19 2025.05.28 Literature Database