Adversarial Camouflage for Node Injection Attack on Graphs.
Shuchang TaoQi CaoHuawei ShenYunfan WuLiang HouXueqi ChengPublished in: CoRR (2022)
Keyphrases
- graph structure
- directed graph
- finding the shortest path
- undirected graph
- graph theory
- graph mining
- graph model
- graph structures
- random graphs
- graph matching
- edge weights
- graph databases
- small world
- small world networks
- neural network
- malicious users
- graphical models
- random walk
- tree structure
- betweenness centrality
- decision trees
- shortest path
- contrast agent
- dos attacks
- graph kernels
- path length
- graph theoretic
- countermeasures
- spanning tree
- weighted graph