グラフ構築

On the Price of Differential Privacy for Hierarchical Clustering

Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22
グラフ構築
プライバシー保護フレームワーク
透かし技術

Graph Mining for Cybersecurity: A Survey

Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16
グラフ埋め込み
グラフ構築
セキュリティ分析

Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging

Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11
グラフ構築
プライバシー評価
通信モデル

StratLearner: Learning a Strategy for Misinformation Prevention in Social Networks

Authors: Guangmo Tong | Published: 2020-09-29
グラフ構築
情報抽出
最適化手法

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

Authors: Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, Yang Liu | Published: 2019-09-08
グラフ構築
データ駆動型脆弱性評価
機械学習

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

Authors: Xiaoqing Sun, Mingkai Tong, Jiahai Yang | Published: 2019-09-04
グラフ構築
データ管理システム
機械学習アルゴリズム

A Graph-Based Machine Learning Approach for Bot Detection

Authors: Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba | Published: 2019-02-22
グラフ構築
データ前処理
ボット検出手法

Adversarial Attacks on Graph Neural Networks via Meta Learning

Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28
グラフ構築
敵対的サンプル
敵対的攻撃手法

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11
グラフ構築
マルウェア検出手法
分類パターン分析