Cited By
View all- Xing XXu MBai YYang D(2025)A graph backdoor detection method for data collection scenariosCybersecurity10.1186/s42400-024-00305-w8:1Online publication date: 2-Jan-2025
- Liao LZheng LShang JLi XChen F(2025)ATPF: An Adaptive Temporal Perturbation Framework for Adversarial Attacks on Temporal Knowledge GraphIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.351068937:3(1091-1104)Online publication date: Mar-2025
- Wang HXu CShi CZheng PZhang SCheng MChen HBaeza-Yates RBonchi F(2024)Unsupervised Heterogeneous Graph Rewriting Attack via Node ClusteringProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671716(3057-3068)Online publication date: 25-Aug-2024
- Show More Cited By