共 35 条
[1]
Arghal Raghu, 2022, PR MACH LEARN RES, V168
[2]
Boyd S., 2004, CONVEX OPTIMIZATION
[3]
Chen L, 2021, PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, P2249
[5]
Dai Enyan, 2022, ARXIV
[6]
Adversarial Training Methods for Network Embedding
[J].
WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019),
2019,
:329-339
[7]
Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters
[J].
CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT,
2020,
:315-324
[8]
All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs
[J].
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM '20),
2020,
:169-177