no code implementations • 24 Apr 2024 • Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, Zhen Wang
Specifically, as sharing is an important social interaction for GNN-based fake news detectors to construct the graph, we simulate sharing behaviors to fool the detectors.
1 code implementation • 11 Feb 2022 • Jiwei Tian, Buhong Wang, Jing Li, Zhen Wang, Mete Ozay
To this end, we first propose a signal-specific method and a universal signal-agnostic method to attack power systems using generated adversarial examples.