Relaxing Graph Transformers for Adversarial Attacks.
Philipp FothLukas GoschSimon GeislerLeo SchwinnStephan GünnemannPublished in: CoRR (2024)
Keyphrases
- graph theory
- random walk
- countermeasures
- graph model
- structured data
- directed graph
- bipartite graph
- multi agent
- graph mining
- security threats
- graph construction
- graph representation
- watermarking scheme
- weighted graph
- graph matching
- connected components
- spanning tree
- graph data
- graph clustering
- malicious attacks
- terrorist attacks