Author of the publication

Adversarial Examples for Graph Data: Deep Insights into Attack and Defense.

, , , , , and . IJCAI, page 4816-4823. ijcai.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study of groupware support for distributed software architecture evaluation process, , , , and . Journal of Systems and Software, 79 (7): 912--925 (July 2006)Learning to Infer Counterfactuals: Meta-Learning for Estimating Multiple Imbalanced Treatment Effects., , , , and . CoRR, (2022)Operationalising Responsible AI Using a Pattern-Oriented Approach: A Case Study on Chatbots in Financial Services., , , , , and . CoRR, (2023)The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques., , , , , and . CoRR, (2019)Wireframe-based UI Design Search through Image Autoencoder., , , , , , and . ACM Trans. Softw. Eng. Methodol., 29 (3): 19:1-19:31 (2020)Can Software Engineering Harness the Benefits of Advanced AI?, and . IEEE Softw., 39 (6): 99-104 (2022)A Pattern-Oriented Reference Architecture for Governance-Driven Blockchain Systems., , , , and . ICSA, page 23-34. IEEE, (2023)A Compliance Checking Framework for DNN Models., , , and . IJCAI, page 6470-6471. ijcai.org, (2019)Reducing Bug Triaging Confusion by Learning from Mistakes with a Bug Tossing Knowledge Graph., , , , , , and . ASE, page 191-202. IEEE, (2021)A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph., , , , and . ICSE Companion, page 60-63. IEEE, (2023)