no code implementations • 26 Nov 2021 • Jinyin Chen, Haiyang Xiong, Dunjie Zhang, Zhenguang Liu, Jiajing Wu
Phishing detectors direct their efforts in hunting phishing addresses.
no code implementations • 19 Aug 2021 • Dunjie Zhang, Jinyin Chen
The transaction pattern graphs and MCGC are more able to detect potential phishing scammers by extracting the transaction pattern features of the target users.
1 code implementation • 16 Jul 2021 • Jinyin Chen, Haiyang Xiong, Haibin Zhenga, Dunjie Zhang, Jian Zhang, Mingwei Jia, Yi Liu
To achieve lower-complexity defense applied to graph classification models, EGC2 utilizes a centrality-based edge-importance index to compress the graphs, filtering out trivial structures and adversarial perturbations in the input graphs, thus improving the model's robustness.
no code implementations • 24 Feb 2021 • Jinyin Chen, Xiang Lin, Dunjie Zhang, Wenrong Jiang, Guohan Huang, Hui Xiong, Yun Xiang
To the best of our knowledge, this is the first targeted label attack technique.
1 code implementation • 18 Jan 2021 • Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang, Wenrong Jiang, Chen Cui
To address this problem, we propose GraphAttacker, a novel generic graph attack framework that can flexibly adjust the structures and the attack strategies according to the graph analysis tasks.