Evaluating Graph Vulnerability and Robustness using TIGER.
Scott FreitasDiyi YangSrijan KumarHanghang TongDuen Horng ChauPublished in: CIKM (2021)
Keyphrases
- graph representation
- structured data
- graph theory
- directed graph
- random walk
- dependency graph
- computational efficiency
- graph structure
- neural network
- graph based algorithm
- graph theoretic
- bipartite graph
- data sets
- graph model
- spanning tree
- risk assessment
- graph matching
- graph data
- graph construction
- learning algorithm
- graph properties