Search Results for author: Shanqing Yu

Found 19 papers, 2 papers with code

A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures

no code implementations24 Mar 2024 Hao Song, Jiacheng Yao, Zhengxi Li, Shaocong Xu, Shibo Jin, Jiajun Zhou, Chenbo Fu, Qi Xuan, Shanqing Yu

Additionally, for the privacy security of FLGNN, this paper designs membership inference attack experiments and differential privacy defense experiments.

Federated Learning Inference Attack +2

General2Specialized LLMs Translation for E-commerce

no code implementations6 Mar 2024 Kaidi Chen, Ben Chen, Dehong Gao, Huangyu Dai, Wen Jiang, Wei Ning, Shanqing Yu, Libin Yang, Xiaoyan Cai

Existing Neural Machine Translation (NMT) models mainly handle translation in the general domain, while overlooking domains with special writing formulas, such as e-commerce and legal documents.

Machine Translation NMT +1

PathMLP: Smooth Path Towards High-order Homophily

no code implementations23 Jun 2023 Chenxuan Xie, Jiajun Zhou, Shengbo Gong, Jiacheng Wan, Jiaxu Qian, Shanqing Yu, Qi Xuan, Xiaoniu Yang

However, common practices in GNNs to acquire high-order information mainly through increasing model depth and altering message-passing mechanisms, which, albeit effective to a certain extent, suffer from three shortcomings: 1) over-smoothing due to excessive model depth and propagation times; 2) high-order information is not fully utilized; 3) low computational efficiency.

Computational Efficiency Representation Learning

Subgraph Networks Based Contrastive Learning

no code implementations6 Jun 2023 Jinhuan Wang, Jiafei Shao, Zeyu Wang, Shanqing Yu, Qi Xuan, Xiaoniu Yang

In addition, we also investigate the impact of the second-order subgraph augmentation on mining graph structure interactions, and further, propose a contrastive objective that fuses the first-order and second-order subgraph information.

Attribute Contrastive Learning +3

Clarify Confused Nodes via Separated Learning

no code implementations4 Jun 2023 Jiajun Zhou, Shengbo Gong, Chenxuan Xie, Shanqing Yu, Qi Xuan, Xiaoniu Yang

A minority of studies attempt to train different node groups separately but suffer from inappropriate separation metrics and low efficiency.

Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning

no code implementations4 May 2023 Dayuan Chen, Jian Zhang, Yuqian Lv, Jinhuan Wang, Hongjie Ni, Shanqing Yu, Zhen Wang, Qi Xuan

Furthermore, most methods concentrate on a single attack goal and lack a generalizable adversary to develop distinct attack strategies for diverse goals, thus limiting precise control over victim model behavior in real-world scenarios.

Specificity

Discover Important Paths in the Knowledge Graph Based on Dynamic Relation Confidence

no code implementations2 Nov 2022 Shanqing Yu, Yijun Wu, Ran Gan, Jiajun Zhou, Ziwan Zheng, Qi Xuan

Most of the existing knowledge graphs are not usually complete and can be complemented by some reasoning algorithms.

Knowledge Graphs Relation

SubGraph Networks based Entity Alignment for Cross-lingual Knowledge Graph

no code implementations7 May 2022 Shanqing Yu, Shihan Zhang, Jianlin Zhang, Jiajun Zhou, Qi Xuan, Bing Li, Xiaojuan Hu

Cross-lingual knowledge graph entity alignment aims to discover the cross-lingual links in the multi-language KGs, which is of great significance to the NLP applications and multi-language KGs fusion.

Entity Alignment Knowledge Graphs

Mixing Signals: Data Augmentation Approach for Deep Learning Based Modulation Recognition

no code implementations5 Apr 2022 Xinjie Xu, Zhuangzhi Chen, Dongwei Xu, Huaji Zhou, Shanqing Yu, Shilian Zheng, Qi Xuan, Xiaoniu Yang

Data augmentation, as the strategy of expanding dataset, can improve the generalization of the deep learning models and thus improve the accuracy of the models to a certain extent.

Automatic Modulation Recognition Classification +1

TSGN: Transaction Subgraph Networks for Identifying Ethereum Phishing Accounts

no code implementations18 Apr 2021 Jinhuan Wang, Pengtao Chen, Shanqing Yu, Qi Xuan

In this paper, we propose a Transaction SubGraph Network (TSGN) based classification model to identify phishing accounts in Ethereum.

Graph Representation Learning

Identity Inference on Blockchain using Graph Neural Network

1 code implementation14 Apr 2021 Jie Shen, Jiajun Zhou, Yunyi Xie, Shanqing Yu, Qi Xuan

In this paper, we present a novel approach to analyze user's behavior from the perspective of the transaction subgraph, which naturally transforms the identity inference task into a graph classification pattern and effectively avoids computation in large-scale graph.

Graph Classification Graph Mining

Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking

no code implementations16 Feb 2021 Yunyi Xie, Jie Jin, Jian Zhang, Shanqing Yu, Qi Xuan

With the wide application of blockchain in the financial field, the rise of various types of cybercrimes has brought great challenges to the security of blockchain.

Link Prediction

M-Evolve: Structural-Mapping-Based Data Augmentation for Graph Classification

no code implementations11 Jul 2020 Jiajun Zhou, Jie Shen, Shanqing Yu, Guanrong Chen, Qi Xuan

Graph classification, which aims to identify the category labels of graphs, plays a significant role in drug classification, toxicity detection, protein analysis etc.

Data Augmentation General Classification +1

MGA: Momentum Gradient Attack on Network

no code implementations26 Feb 2020 Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan

The adversarial attack methods based on gradient information can adequately find the perturbations, that is, the combinations of rewired links, thereby reducing the effectiveness of the deep learning model based graph embedding algorithms, but it is also easy to fall into a local optimum.

Social and Information Networks

Unsupervised Euclidean Distance Attack on Network Embedding

no code implementations27 May 2019 Qi Xuan, Jun Zheng, Lihong Chen, Shanqing Yu, Jinyin Chen, Dan Zhang, Qingpeng Zhang Member

Since a large number of downstream network algorithms, such as community detection and node classification, rely on the Euclidean distance between nodes to evaluate the similarity between them in the embedding space, EDA can be considered as a universal attack on a variety of network algorithms.

Social and Information Networks Physics and Society

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network

no code implementations12 Apr 2019 Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan

In particular, we use a bipartite network to construct the user-item network, and represent the interactions among users (or items) by the corresponding one-mode projection network.

Clustering Recommendation Systems

GA Based Q-Attack on Community Detection

no code implementations1 Nov 2018 Jinyin Chen, Lihong Chen, Yixian Chen, Minghao Zhao, Shanqing Yu, Qi Xuan, Xiaoniu Yang

In particular, we first give two heuristic attack strategies, i. e., Community Detection Attack (CDA) and Degree Based Attack (DBA), as baselines, utilizing the information of detected community structure and node degree, respectively.

Social and Information Networks

Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations

no code implementations16 Sep 2018 Shanqing Yu, Minghao Zhao, Chenbo Fu, Huimin Huang, Xincheng Shu, Qi Xuan, Guanrong Chen

This is the first time to study privacy protection on targeted links against link-prediction-based attacks.

Social and Information Networks Physics and Society

Cannot find the paper you are looking for? You can Submit a new open access paper.