Alert button
Picture for Binghui Wang

Binghui Wang

Alert button

Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs

Add code
Bookmark button
Alert button
Sep 12, 2020
Houxiang Fan, Binghui Wang, Pan Zhou, Ang Li, Meng Pang, Zichuan Xu, Cai Fu, Hai Li, Yiran Chen

Figure 1 for Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs
Figure 2 for Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs
Figure 3 for Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs
Figure 4 for Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs
Viaarxiv icon

Evasion Attacks to Graph Neural Networks via Influence Function

Add code
Bookmark button
Alert button
Sep 12, 2020
Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, Yiran Chen

Figure 1 for Evasion Attacks to Graph Neural Networks via Influence Function
Figure 2 for Evasion Attacks to Graph Neural Networks via Influence Function
Figure 3 for Evasion Attacks to Graph Neural Networks via Influence Function
Figure 4 for Evasion Attacks to Graph Neural Networks via Influence Function
Viaarxiv icon

Efficient Evasion Attacks to Graph Neural Networks via Influence Function

Add code
Bookmark button
Alert button
Sep 01, 2020
Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, Yiran Chen

Figure 1 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Figure 2 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Figure 3 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Figure 4 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Viaarxiv icon

LotteryFL: Personalized and Communication-Efficient Federated Learning with Lottery Ticket Hypothesis on Non-IID Datasets

Add code
Bookmark button
Alert button
Aug 07, 2020
Ang Li, Jingwei Sun, Binghui Wang, Lin Duan, Sicheng Li, Yiran Chen, Hai Li

Figure 1 for LotteryFL: Personalized and Communication-Efficient Federated Learning with Lottery Ticket Hypothesis on Non-IID Datasets
Figure 2 for LotteryFL: Personalized and Communication-Efficient Federated Learning with Lottery Ticket Hypothesis on Non-IID Datasets
Figure 3 for LotteryFL: Personalized and Communication-Efficient Federated Learning with Lottery Ticket Hypothesis on Non-IID Datasets
Figure 4 for LotteryFL: Personalized and Communication-Efficient Federated Learning with Lottery Ticket Hypothesis on Non-IID Datasets
Viaarxiv icon

Backdoor Attacks to Graph Neural Networks

Add code
Bookmark button
Alert button
Jun 19, 2020
Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong

Figure 1 for Backdoor Attacks to Graph Neural Networks
Figure 2 for Backdoor Attacks to Graph Neural Networks
Figure 3 for Backdoor Attacks to Graph Neural Networks
Figure 4 for Backdoor Attacks to Graph Neural Networks
Viaarxiv icon

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Add code
Bookmark button
Alert button
Apr 29, 2020
Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen

Figure 1 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Figure 2 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Figure 3 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Figure 4 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Viaarxiv icon

On Certifying Robustness against Backdoor Attacks via Randomized Smoothing

Add code
Bookmark button
Alert button
Feb 26, 2020
Binghui Wang, Xiaoyu Cao, Jinyuan jia, Neil Zhenqiang Gong

Figure 1 for On Certifying Robustness against Backdoor Attacks via Randomized Smoothing
Viaarxiv icon

Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing

Add code
Bookmark button
Alert button
Feb 09, 2020
Jinyuan Jia, Binghui Wang, Xiaoyu Cao, Neil Zhenqiang Gong

Figure 1 for Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
Figure 2 for Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
Figure 3 for Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
Figure 4 for Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
Viaarxiv icon

Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing

Add code
Bookmark button
Alert button
Dec 20, 2019
Jinyuan Jia, Xiaoyu Cao, Binghui Wang, Neil Zhenqiang Gong

Figure 1 for Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing
Figure 2 for Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing
Figure 3 for Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing
Viaarxiv icon