Search Results for author: Peican Zhu

Found 4 papers, 0 papers with code

A General Black-box Adversarial Attack on Graph-based Fake News Detectors

no code implementations24 Apr 2024 Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, Zhen Wang

Specifically, as sharing is an important social interaction for GNN-based fake news detectors to construct the graph, we simulate sharing behaviors to fool the detectors.

Adversarial Attack

GIN-SD: Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion

no code implementations27 Feb 2024 Le Cheng, Peican Zhu, Keke Tang, Chao GAO, Zhen Wang

In this paper, we address a more challenging task, rumor source detection with incomplete user data, and propose a novel framework, i. e., Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion (GIN-SD), to tackle this challenge.

Advancing Adversarial Robustness Through Adversarial Logit Update

no code implementations29 Aug 2023 Hao Xuan, Peican Zhu, Xingyu Li

Based on ALU, we introduce a new classification paradigm that utilizes pre- and post-purification logit differences for model's adversarial robustness boost.

Adversarial Robustness

Compactness Score: A Fast Filter Method for Unsupervised Feature Selection

no code implementations31 Jan 2022 Peican Zhu, Xin Hou, Keke Tang, Zhen Wang, Feiping Nie

For feature engineering, feature selection seems to be an important research content in which is anticipated to select "excellent" features from candidate ones.

Decision Making Dimensionality Reduction +2

Cannot find the paper you are looking for? You can Submit a new open access paper.