Search

Your search keyword '"XUAN QI"' showing total 96 results

Search Constraints

Start Over You searched for: Author "XUAN QI" Remove constraint Author: "XUAN QI" Database arXiv Remove constraint Database: arXiv
96 results on '"XUAN QI"'

Search Results

1. Double Whammy: Stealthy Data Manipulation aided Reconstruction Attack on Graph Federated Learning

2. Rethinking Graph Transformer Architecture Design for Node Classification

3. Network Anomaly Traffic Detection via Multi-view Feature Fusion

4. Photonic time-delayed reservoir computing based on lithium niobate microring resonators

5. Social contagion under hybrid interactions

6. MDM: Advancing Multi-Domain Distribution Matching for Automatic Modulation Recognition Dataset Synthesis

7. Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-supervision

8. Exploring agent interaction patterns in the comment sections of fake and real news

9. Dual-view Aware Smart Contract Vulnerability Detection for Ethereum

10. A Generic Layer Pruning Method for Signal Modulation Recognition Deep Learning Models

11. Node Injection Attack Based on Label Propagation Against Graph Neural Network

12. Knowledge-enhanced Relation Graph and Task Sampling for Few-shot Molecular Property Prediction

13. Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection

14. Improving Network Degree Correlation by Degree-preserving Rewiring

15. Exploring the Impact of Dataset Bias on Dataset Distillation

16. A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures

17. Backfire Effect Reveals Early Controversy in Online Media

18. Multi-Modal Representation Learning for Molecular Property Prediction: Sequence, Graph, Geometry

19. MAD-MulW: A Multi-Window Anomaly Detection Framework for BGP Security Events

20. Augmenting Radio Signals with Wavelet Transform for Deep Learning-Based Modulation Recognition

21. BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

22. Attacking The Assortativity Coefficient Under A Rewiring Strategy

23. RK-core: An Established Methodology for Exploring the Hierarchical Structure within Datasets

24. Can pre-trained models assist in dataset distillation?

25. Multi-triplet Feature Augmentation for Ponzi Scheme Detection in Ethereum

26. Photonic time-delayed reservoir computing based on series coupled microring resonators with high memory capacity

27. MONA: An Efficient and Scalable Strategy for Targeted k-Nodes Collapse

28. Epidemic spreading under game-based self-quarantine behaviors: The different effects of local and global information

29. PathMLP: Smooth Path Towards High-order Homophily

30. Subgraph Networks Based Contrastive Learning

31. Clarify Confused Nodes via Separated Learning

32. How does Contrastive Learning Organize Images?

33. Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning

34. SR-init: An interpretable layer pruning method

35. Neighborhood Homophily-based Graph Convolutional Network

36. Targeted k-node Collapse Problem: Towards Understanding the Robustness of Local k-core Structure

37. Data Augmentation on Graphs: A Technical Survey

38. Discover Important Paths in the Knowledge Graph Based on Dynamic Relation Confidence

39. Time-aware Metapath Feature Augmentation for Ponzi Detection in Ethereum

40. GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections

41. TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum

42. Dual-channel Early Warning Framework for Ethereum Ponzi Schemes

43. SubGraph Networks based Entity Alignment for Cross-lingual Knowledge Graph

44. Improving robustness of language models from a geometry-aware perspective

45. Cross Cryptocurrency Relationship Mining for Bitcoin Price Prediction

46. Heterogeneous Feature Augmentation for Ponzi Detection in Ethereum

47. Phishing Fraud Detection on Ethereum using Graph Neural Network

48. Mixing Signals: Data Augmentation Approach for Deep Learning Based Modulation Recognition

49. Behavior-aware Account De-anonymization on Ethereum Interaction Graph

50. Hyperspectral Imaging for cherry tomato

Catalog

Books, media, physical & digital resources