no code implementations • 26 Feb 2020 • Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan
The adversarial attack methods based on gradient information can adequately find the perturbations, that is, the combinations of rewired links, thereby reducing the effectiveness of the deep learning model based graph embedding algorithms, but it is also easy to fall into a local optimum.
Social and Information Networks
no code implementations • 1 May 2019 • Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng
In this paper, comprehensive evaluation metrics are brought up for different adversarial attack methods.