Alert button
Picture for Haiyang Xiong

Haiyang Xiong

Alert button

Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs

Add code
Bookmark button
Alert button
Oct 25, 2022
Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang

Figure 1 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Figure 2 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Figure 3 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Figure 4 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Viaarxiv icon

Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection

Add code
Bookmark button
Alert button
Aug 14, 2022
Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen

Figure 1 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Figure 2 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Figure 3 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Figure 4 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Viaarxiv icon

TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors

Add code
Bookmark button
Alert button
Nov 26, 2021
Jinyin Chen, Haiyang Xiong, Dunjie Zhang, Zhenguang Liu, Jiajing Wu

Figure 1 for TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors
Figure 2 for TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors
Figure 3 for TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors
Figure 4 for TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors
Viaarxiv icon

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction

Add code
Bookmark button
Alert button
Oct 08, 2021
Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Guodong Jiang, Yi Liu

Figure 1 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Figure 2 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Figure 3 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Figure 4 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Viaarxiv icon