Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Attacking shortest paths by cutting edges
Identifying shortest paths between nodes in a network is a common graph analysis problem
that is important for many applications involving routing of resources. An adversary that can …
that is important for many applications involving routing of resources. An adversary that can …
Alternative route-based attacks in metropolitan traffic systems
With the growing reliance on driving direction applications that dynamically account for live
traffic updates, drivers are much more likely to act optimally, by taking the shortest path to …
traffic updates, drivers are much more likely to act optimally, by taking the shortest path to …
Towards explainable road navigation systems
Road navigation systems are important systems for pedestrians, drivers, and autonomous
vehicles. Routes provided by such systems can be unintuitive, and may not contribute to an …
vehicles. Routes provided by such systems can be unintuitive, and may not contribute to an …
Defense Against Shortest Path Attacks
Identifying shortest paths between nodes in a network is an important task in applications
involving routing of resources. Recent work has shown that a malicious actor can …
involving routing of resources. Recent work has shown that a malicious actor can …
Graph-Based Temporal Process Planning and Scheduling for Well Drilling Operations
Well construction is the most expensive stage of oil field development. Oil and gas
companies carefully calculate all possible expenditures to assure that the project of well …
companies carefully calculate all possible expenditures to assure that the project of well …
Network Design Through Graph Neural Networks: Identifying Challenges and Improving Performance
D Loveland, R Caceres - … Conference on Complex Networks and Their …, 2023 - Springer
Abstract Graph Neural Network (GNN) research has produced strategies to modify a graph's
edges using gradients from a trained GNN, with the goal of network design. However, the …
edges using gradients from a trained GNN, with the goal of network design. However, the …
图深度学**攻击模型综述
任一支, **泽龙, 袁理锋, 张祯, 朱娅妮, 吴国华 - 信息安全学报, 2022 - jcs.iie.ac.cn
**年来, 图深度学**模型面临的安全威胁日益严重, 相关研究表明, 推荐系统中恶意用户可以通过
诋毁, 女巫攻击等攻击手段轻易地对系统进行欺骗. 本文对现有基于图深度学**攻击工作进行 …
诋毁, 女巫攻击等攻击手段轻易地对系统进行欺骗. 本文对现有基于图深度学**攻击工作进行 …
Check for Network Design Through Graph Neural Networks: Identifying Challenges and Improving Performance Donald Loveland¹ () and Rajmonda Caceres²
D Loveland¹, R Caceres - … & Their Applications XII: Proceedings of …, 2024 - books.google.com
Graph Neural Network (GNN) research has produced strategies to modify a graph's edges
using gradients from a trained GNN, with the goal of network design. However, the factors …
using gradients from a trained GNN, with the goal of network design. However, the factors …
Optimal Edge Weight Perturbations to Attack Shortest Paths
Finding shortest paths in a given network (eg, a computer network or a road network) is a
well-studied task with many applications. We consider this task under the presence of an …
well-studied task with many applications. We consider this task under the presence of an …