Alert button
Picture for Yu Rong

Yu Rong

Alert button

Spectral Graph Attention Network

Add code
Bookmark button
Alert button
Mar 16, 2020
Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Somayeh Sojoudi, Junzhou Huang, Wenwu Zhu

Figure 1 for Spectral Graph Attention Network
Figure 2 for Spectral Graph Attention Network
Figure 3 for Spectral Graph Attention Network
Figure 4 for Spectral Graph Attention Network
Viaarxiv icon

Graph Representation Learning via Graphical Mutual Information Maximization

Add code
Bookmark button
Alert button
Feb 04, 2020
Zhen Peng, Wenbing Huang, Minnan Luo, Qinghua Zheng, Yu Rong, Tingyang Xu, Junzhou Huang

Figure 1 for Graph Representation Learning via Graphical Mutual Information Maximization
Figure 2 for Graph Representation Learning via Graphical Mutual Information Maximization
Figure 3 for Graph Representation Learning via Graphical Mutual Information Maximization
Figure 4 for Graph Representation Learning via Graphical Mutual Information Maximization
Viaarxiv icon

Adversarial Attack on Community Detection by Hiding Individuals

Add code
Bookmark button
Alert button
Jan 22, 2020
Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang

Figure 1 for Adversarial Attack on Community Detection by Hiding Individuals
Figure 2 for Adversarial Attack on Community Detection by Hiding Individuals
Figure 3 for Adversarial Attack on Community Detection by Hiding Individuals
Figure 4 for Adversarial Attack on Community Detection by Hiding Individuals
Viaarxiv icon

Graph Ordering: Towards the Optimal by Learning

Add code
Bookmark button
Alert button
Jan 18, 2020
Kangfei Zhao, Yu Rong, Jeffrey Xu Yu, Junzhou Huang, Hao Zhang

Figure 1 for Graph Ordering: Towards the Optimal by Learning
Figure 2 for Graph Ordering: Towards the Optimal by Learning
Figure 3 for Graph Ordering: Towards the Optimal by Learning
Figure 4 for Graph Ordering: Towards the Optimal by Learning
Viaarxiv icon

Rumor Detection on Social Media with Bi-Directional Graph Convolutional Networks

Add code
Bookmark button
Alert button
Jan 17, 2020
Tian Bian, Xi Xiao, Tingyang Xu, Peilin Zhao, Wenbing Huang, Yu Rong, Junzhou Huang

Figure 1 for Rumor Detection on Social Media with Bi-Directional Graph Convolutional Networks
Figure 2 for Rumor Detection on Social Media with Bi-Directional Graph Convolutional Networks
Figure 3 for Rumor Detection on Social Media with Bi-Directional Graph Convolutional Networks
Figure 4 for Rumor Detection on Social Media with Bi-Directional Graph Convolutional Networks
Viaarxiv icon

DropEdge: Towards the Very Deep Graph Convolutional Networks for Node Classification

Add code
Bookmark button
Alert button
Sep 09, 2019
Yu Rong, Wenbing Huang, Tingyang Xu, Junzhou Huang

Figure 1 for DropEdge: Towards the Very Deep Graph Convolutional Networks for Node Classification
Figure 2 for DropEdge: Towards the Very Deep Graph Convolutional Networks for Node Classification
Figure 3 for DropEdge: Towards the Very Deep Graph Convolutional Networks for Node Classification
Figure 4 for DropEdge: Towards the Very Deep Graph Convolutional Networks for Node Classification
Viaarxiv icon

Graph Convolutional Networks for Temporal Action Localization

Add code
Bookmark button
Alert button
Sep 07, 2019
Runhao Zeng, Wenbing Huang, Mingkui Tan, Yu Rong, Peilin Zhao, Junzhou Huang, Chuang Gan

Figure 1 for Graph Convolutional Networks for Temporal Action Localization
Figure 2 for Graph Convolutional Networks for Temporal Action Localization
Figure 3 for Graph Convolutional Networks for Temporal Action Localization
Figure 4 for Graph Convolutional Networks for Temporal Action Localization
Viaarxiv icon

A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models

Add code
Bookmark button
Alert button
Sep 06, 2019
Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang

Figure 1 for A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models
Figure 2 for A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models
Figure 3 for A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models
Figure 4 for A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models
Viaarxiv icon

Delving Deep Into Hybrid Annotations for 3D Human Recovery in the Wild

Add code
Bookmark button
Alert button
Aug 20, 2019
Yu Rong, Ziwei Liu, Cheng Li, Kaidi Cao, Chen Change Loy

Figure 1 for Delving Deep Into Hybrid Annotations for 3D Human Recovery in the Wild
Figure 2 for Delving Deep Into Hybrid Annotations for 3D Human Recovery in the Wild
Figure 3 for Delving Deep Into Hybrid Annotations for 3D Human Recovery in the Wild
Figure 4 for Delving Deep Into Hybrid Annotations for 3D Human Recovery in the Wild
Viaarxiv icon

The General Black-box Attack Method for Graph Neural Networks

Add code
Bookmark button
Alert button
Aug 07, 2019
Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang

Figure 1 for The General Black-box Attack Method for Graph Neural Networks
Figure 2 for The General Black-box Attack Method for Graph Neural Networks
Figure 3 for The General Black-box Attack Method for Graph Neural Networks
Figure 4 for The General Black-box Attack Method for Graph Neural Networks
Viaarxiv icon