Detecting masquerade attacks in controller area networks using graph machine learning
Modern vehicles rely on a myriad of electronic control units (ECUs) interconnected via
controller area networks (CANs) for critical operations. Despite their ubiquitous use and …
controller area networks (CANs) for critical operations. Despite their ubiquitous use and …
Whole-graph representation learning for the classification of signed networks
Graphs are ubiquitous for modeling complex systems involving structured data and
relationships. Consequently, graph representation learning, which aims to automatically …
relationships. Consequently, graph representation learning, which aims to automatically …
Netpro2vec: a graph embedding framework for biomedical applications
The ever-increasing importance of structured data in different applications, especially in the
biomedical field, has driven the need for reducing its complexity through projections into a …
biomedical field, has driven the need for reducing its complexity through projections into a …
Adversarial attacks on graph-level embedding methods: A case study
As the number of graph-level embedding techniques increases at an unprecedented speed,
questions arise about their behavior and performance when training data undergo …
questions arise about their behavior and performance when training data undergo …
A distance covariance-based kernel for nonlinear causal clustering in heterogeneous populations
We consider the problem of causal structure learning in the setting of heterogeneous
populations, ie, populations in which a single causal structure does not adequately …
populations, ie, populations in which a single causal structure does not adequately …
Whole-graph embedding and adversarial attacks for life sciences
Networks provide a suitable model for many scientific and technological problems that
require the representation of complex entities and their relations. Life sciences applications …
require the representation of complex entities and their relations. Life sciences applications …
Offline EEG hyper-scanning using anonymous walk embeddings in tacit coordination games
In this paper we present a method to examine the synchrony between brains without the
need to carry out simultaneous recordings of EEG signals from two people which is the …
need to carry out simultaneous recordings of EEG signals from two people which is the …
Network-Based Computational Modeling to Unravel Gene Essentiality
Essential genes are reductively defined as those fundamental for an organism's
reproductive success and growth. Still, the so-called essentiality of a gene is a context …
reproductive success and growth. Still, the so-called essentiality of a gene is a context …
Dictionary learning on graph data with weisfieler-lehman sub-tree kernel and ksvd
Graph representation has gained wide popularity as a data representation method in many
applications. Graph embedding methods convert graphs to a vector representation and are …
applications. Graph embedding methods convert graphs to a vector representation and are …
Performance evaluation of adversarial attacks on whole-graph embedding models
Graph embedding techniques are becoming increasingly common in many fields ranging
from scientific computing to biomedical applications and finance. These techniques aim to …
from scientific computing to biomedical applications and finance. These techniques aim to …