Attacking black-box recommendations via copying cross-domain user profiles

W Fan, T Derr, X Zhao, Y Ma, H Liu… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
Recommender systems, which aim to suggest personalized lists of items for users, have
drawn a lot of attention. In fact, many of these state-of-the-art recommender systems have …

Jointly attacking graph neural network and its explanations

W Fan, H Xu, W **, X Liu, X Tang… - 2023 IEEE 39th …, 2023 - ieeexplore.ieee.org
Graph Neural Networks (GNNs) have boosted the performance for many graph-related
tasks. Despite the great success, recent studies have shown that GNNs are still vulnerable to …

Scene graph semantic inference for image and text matching

J Pei, K Zhong, Z Yu, L Wang… - ACM Transactions on …, 2023 - dl.acm.org
With the rapid development of information technology, image and text data have increased
dramatically. Image and text matching techniques enable computers to understand …

Self-supervised deep partial adversarial network for micro-video multimodal classification

Y Li, S Liu, X Wang, P **g - Information Sciences, 2023 - Elsevier
Micro-videos have gained popularity on various social media platforms because they
provide a great medium for real-time storytelling. Although micro-videos can be naturally …

Deep tensor CCA for multi-view learning

HS Wong, L Wang, R Chan… - IEEE Transactions on Big …, 2021 - ieeexplore.ieee.org
We present Deep Tensor Canonical Correlation Analysis (DTCCA), a method to learn
complex nonlinear transformations of multiple views (more than two) of data such that the …