Cited By
View all- Yan HLin XLi SPeng HZhang B(2025)Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351654820(279-293)Online publication date: 2025
- Yuan ZSun QZhou HShao MFu X(2025)A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language modelsInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02516-6Online publication date: 4-Feb-2025
- Tong HMa HShen HLi ZChang L(2024)Crucial rather than random: Attacking crucial substructure for backdoor attacks on graph neural networksEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108966136(108966)Online publication date: Oct-2024