Now showing items 1-1 of 1
Adversarial Attack on Graph-Structured Data
(Georgia Institute of Technology, 2019-03-15)
Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to the robustness of such ...