Cited By
View all- Xing XXu MBai YYang D(2025)A graph backdoor detection method for data collection scenariosCybersecurity10.1186/s42400-024-00305-w8:1Online publication date: 2-Jan-2025
- Wang HXu CShi CZheng PZhang SCheng MChen HBaeza-Yates RBonchi F(2024)Unsupervised Heterogeneous Graph Rewriting Attack via Node ClusteringProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671716(3057-3068)Online publication date: 25-Aug-2024
- Yoon KIn YLee NKim KPark CSerra ESpezzano F(2024)Debiased Graph Poisoning Attack via Contrastive Surrogate ObjectiveProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679686(3012-3021)Online publication date: 21-Oct-2024
- Show More Cited By