Picture for Tobias Schumacher

Tobias Schumacher

The Impact of Dimensionality on the Stability of Node Embeddings

Add code
Apr 09, 2026
Viaarxiv icon

What Do Temporal Graph Learning Models Learn?

Add code
Oct 10, 2025
Figure 1 for What Do Temporal Graph Learning Models Learn?
Figure 2 for What Do Temporal Graph Learning Models Learn?
Figure 3 for What Do Temporal Graph Learning Models Learn?
Figure 4 for What Do Temporal Graph Learning Models Learn?
Viaarxiv icon

ReSi: A Comprehensive Benchmark for Representational Similarity Measures

Add code
Aug 01, 2024
Figure 1 for ReSi: A Comprehensive Benchmark for Representational Similarity Measures
Figure 2 for ReSi: A Comprehensive Benchmark for Representational Similarity Measures
Figure 3 for ReSi: A Comprehensive Benchmark for Representational Similarity Measures
Figure 4 for ReSi: A Comprehensive Benchmark for Representational Similarity Measures
Viaarxiv icon

Similarity of Neural Network Models: A Survey of Functional and Representational Measures

Add code
May 10, 2023
Viaarxiv icon

Properties of Group Fairness Metrics for Rankings

Add code
Dec 29, 2022
Viaarxiv icon

A Comparative Evaluation of Quantification Methods

Add code
Mar 04, 2021
Figure 1 for A Comparative Evaluation of Quantification Methods
Figure 2 for A Comparative Evaluation of Quantification Methods
Figure 3 for A Comparative Evaluation of Quantification Methods
Figure 4 for A Comparative Evaluation of Quantification Methods
Viaarxiv icon

The Effects of Randomness on the Stability of Node Embeddings

Add code
May 20, 2020
Figure 1 for The Effects of Randomness on the Stability of Node Embeddings
Figure 2 for The Effects of Randomness on the Stability of Node Embeddings
Figure 3 for The Effects of Randomness on the Stability of Node Embeddings
Figure 4 for The Effects of Randomness on the Stability of Node Embeddings
Viaarxiv icon

Privacy Attacks on Network Embeddings

Add code
Dec 23, 2019
Figure 1 for Privacy Attacks on Network Embeddings
Figure 2 for Privacy Attacks on Network Embeddings
Figure 3 for Privacy Attacks on Network Embeddings
Figure 4 for Privacy Attacks on Network Embeddings
Viaarxiv icon