no code implementations • 24 Mar 2024 • Hao Song, Jiacheng Yao, Zhengxi Li, Shaocong Xu, Shibo Jin, Jiajun Zhou, Chenbo Fu, Qi Xuan, Shanqing Yu
Additionally, for the privacy security of FLGNN, this paper designs membership inference attack experiments and differential privacy defense experiments.
no code implementations • 6 Mar 2024 • Kaidi Chen, Ben Chen, Dehong Gao, Huangyu Dai, Wen Jiang, Wei Ning, Shanqing Yu, Libin Yang, Xiaoyan Cai
Existing Neural Machine Translation (NMT) models mainly handle translation in the general domain, while overlooking domains with special writing formulas, such as e-commerce and legal documents.
no code implementations • 23 Jun 2023 • Chenxuan Xie, Jiajun Zhou, Shengbo Gong, Jiacheng Wan, Jiaxu Qian, Shanqing Yu, Qi Xuan, Xiaoniu Yang
However, common practices in GNNs to acquire high-order information mainly through increasing model depth and altering message-passing mechanisms, which, albeit effective to a certain extent, suffer from three shortcomings: 1) over-smoothing due to excessive model depth and propagation times; 2) high-order information is not fully utilized; 3) low computational efficiency.
no code implementations • 6 Jun 2023 • Jinhuan Wang, Jiafei Shao, Zeyu Wang, Shanqing Yu, Qi Xuan, Xiaoniu Yang
In addition, we also investigate the impact of the second-order subgraph augmentation on mining graph structure interactions, and further, propose a contrastive objective that fuses the first-order and second-order subgraph information.
no code implementations • 4 Jun 2023 • Jiajun Zhou, Shengbo Gong, Chenxuan Xie, Shanqing Yu, Qi Xuan, Xiaoniu Yang
A minority of studies attempt to train different node groups separately but suffer from inappropriate separation metrics and low efficiency.
no code implementations • 4 May 2023 • Dayuan Chen, Jian Zhang, Yuqian Lv, Jinhuan Wang, Hongjie Ni, Shanqing Yu, Zhen Wang, Qi Xuan
Furthermore, most methods concentrate on a single attack goal and lack a generalizable adversary to develop distinct attack strategies for diverse goals, thus limiting precise control over victim model behavior in real-world scenarios.
no code implementations • 2 Nov 2022 • Shanqing Yu, Yijun Wu, Ran Gan, Jiajun Zhou, Ziwan Zheng, Qi Xuan
Most of the existing knowledge graphs are not usually complete and can be complemented by some reasoning algorithms.
no code implementations • 7 May 2022 • Shanqing Yu, Shihan Zhang, Jianlin Zhang, Jiajun Zhou, Qi Xuan, Bing Li, Xiaojuan Hu
Cross-lingual knowledge graph entity alignment aims to discover the cross-lingual links in the multi-language KGs, which is of great significance to the NLP applications and multi-language KGs fusion.
no code implementations • 5 Apr 2022 • Xinjie Xu, Zhuangzhi Chen, Dongwei Xu, Huaji Zhou, Shanqing Yu, Shilian Zheng, Qi Xuan, Xiaoniu Yang
Data augmentation, as the strategy of expanding dataset, can improve the generalization of the deep learning models and thus improve the accuracy of the models to a certain extent.
1 code implementation • 13 Oct 2021 • Jinyin Chen, Guohan Huang, Haibin Zheng, Shanqing Yu, Wenrong Jiang, Chen Cui
This is the first study of adversarial attacks on GVFL.
no code implementations • 18 Apr 2021 • Jinhuan Wang, Pengtao Chen, Shanqing Yu, Qi Xuan
In this paper, we propose a Transaction SubGraph Network (TSGN) based classification model to identify phishing accounts in Ethereum.
1 code implementation • 14 Apr 2021 • Jie Shen, Jiajun Zhou, Yunyi Xie, Shanqing Yu, Qi Xuan
In this paper, we present a novel approach to analyze user's behavior from the perspective of the transaction subgraph, which naturally transforms the identity inference task into a graph classification pattern and effectively avoids computation in large-scale graph.
no code implementations • 16 Feb 2021 • Yunyi Xie, Jie Jin, Jian Zhang, Shanqing Yu, Qi Xuan
With the wide application of blockchain in the financial field, the rise of various types of cybercrimes has brought great challenges to the security of blockchain.
no code implementations • 11 Jul 2020 • Jiajun Zhou, Jie Shen, Shanqing Yu, Guanrong Chen, Qi Xuan
Graph classification, which aims to identify the category labels of graphs, plays a significant role in drug classification, toxicity detection, protein analysis etc.
no code implementations • 26 Feb 2020 • Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan
The adversarial attack methods based on gradient information can adequately find the perturbations, that is, the combinations of rewired links, thereby reducing the effectiveness of the deep learning model based graph embedding algorithms, but it is also easy to fall into a local optimum.
Social and Information Networks
no code implementations • 27 May 2019 • Qi Xuan, Jun Zheng, Lihong Chen, Shanqing Yu, Jinyin Chen, Dan Zhang, Qingpeng Zhang Member
Since a large number of downstream network algorithms, such as community detection and node classification, rely on the Euclidean distance between nodes to evaluate the similarity between them in the embedding space, EDA can be considered as a universal attack on a variety of network algorithms.
Social and Information Networks Physics and Society
no code implementations • 12 Apr 2019 • Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan
In particular, we use a bipartite network to construct the user-item network, and represent the interactions among users (or items) by the corresponding one-mode projection network.
no code implementations • 1 Nov 2018 • Jinyin Chen, Lihong Chen, Yixian Chen, Minghao Zhao, Shanqing Yu, Qi Xuan, Xiaoniu Yang
In particular, we first give two heuristic attack strategies, i. e., Community Detection Attack (CDA) and Degree Based Attack (DBA), as baselines, utilizing the information of detected community structure and node degree, respectively.
Social and Information Networks
no code implementations • 16 Sep 2018 • Shanqing Yu, Minghao Zhao, Chenbo Fu, Huimin Huang, Xincheng Shu, Qi Xuan, Guanrong Chen
This is the first time to study privacy protection on targeted links against link-prediction-based attacks.
Social and Information Networks Physics and Society