Deep Neural Network (DNN) models are often deployed in resource-sharing
...
The language models, especially the basic text classification models, ha...
Image segmentation is an important problem in many safety-critical
appli...
Integrated Gradients (IG) as well as its variants are well-known techniq...
Graph neural networks (GNNs) have achieved state-of-the-art performance ...
We study certified robustness of machine learning classifiers against
ad...
Membership inference attacks (MIAs) against machine learning models can ...
Graph neural networks (GNNs) have achieved state-of-the-art performance ...
Cross-device tracking has drawn growing attention from both commercial
c...
In this paper, we propose a novel gender bias detection method by utiliz...
Graph Neural Networks (GNNs) have achieved state-of-the-art performance ...
Learning with graphs has attracted significant attention recently. Exist...
Crowd counting has drawn much attention due to its importance in
safety-...
Semi-supervised node classification on graph-structured data has many
ap...
Federated learning (FL) is a popular distributed learning framework that...
Graph-based semi-supervised node classification (GraphSSC) has wide
appl...
Top-k predictions are used in many real-world applications such as machi...
In the era of deep learning, a user often leverages a third-party machin...
Graph neural networks (GNNs) have achieved state-of-the-art performance ...
Link prediction in dynamic graphs (LPDG) is an important research proble...
Graph neural networks (GNNs) have recently gained much attention for nod...
Federated learning is a popular distributed machine learning paradigm wi...
Node classification and graph classification are two basic graph analyti...
We consider the blackbox transfer-based targeted adversarial attack thre...
Backdoor attack is a severe security threat to deep neural networks (DNN...
Community detection plays a key role in understanding graph structure.
H...
It is well-known that classifiers are vulnerable to adversarial
perturba...
Graph-based classification methods are widely used for security and priv...
Many security and privacy problems can be modeled as a graph classificat...
Detecting fake users (also called Sybils) in online social networks is a...
Sybil attacks are becoming increasingly widespread and pose a significan...
Sybil detection in social networks is a basic security research problem....
Hyperparameters are critical in machine learning, as different
hyperpara...
We study the underlying structure of data (approximately) generated from...