Picture for Jinyin Chen

Jinyin Chen

Senior Member, IEEE

Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning

Add code
Oct 13, 2021
Figure 1 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Figure 2 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Figure 3 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Figure 4 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Viaarxiv icon

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction

Add code
Oct 08, 2021
Figure 1 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Figure 2 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Figure 3 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Figure 4 for Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Viaarxiv icon

Blockchain Phishing Scam Detection via Multi-channel Graph Classification

Add code
Aug 19, 2021
Figure 1 for Blockchain Phishing Scam Detection via Multi-channel Graph Classification
Figure 2 for Blockchain Phishing Scam Detection via Multi-channel Graph Classification
Figure 3 for Blockchain Phishing Scam Detection via Multi-channel Graph Classification
Figure 4 for Blockchain Phishing Scam Detection via Multi-channel Graph Classification
Viaarxiv icon

EGC2: Enhanced Graph Classification with Easy Graph Compression

Add code
Jul 16, 2021
Figure 1 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 2 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 3 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 4 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Viaarxiv icon

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks

Add code
May 14, 2021
Figure 1 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 2 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 3 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 4 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Viaarxiv icon

MASS: Multi-task Anthropomorphic Speech Synthesis Framework

Add code
May 10, 2021
Figure 1 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 2 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 3 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 4 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Viaarxiv icon

Graphfool: Targeted Label Adversarial Attack on Graph Embedding

Add code
Feb 24, 2021
Figure 1 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Figure 2 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Figure 3 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Figure 4 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Viaarxiv icon

GraphAttacker: A General Multi-Task GraphAttack Framework

Add code
Jan 18, 2021
Figure 1 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 2 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 3 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 4 for GraphAttacker: A General Multi-Task GraphAttack Framework
Viaarxiv icon

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack

Add code
Jan 08, 2021
Figure 1 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 2 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 3 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 4 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Viaarxiv icon

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries

Add code
Dec 18, 2020
Figure 1 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 2 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 3 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 4 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Viaarxiv icon