Follow
Jinhuan Wang
Title
Cited by
Cited by
Year
Subgraph networks with application to structural feature space expansion
Q Xuan, J Wang, M Zhao, J Yuan, C Fu, Z Ruan, G Chen
IEEE Transactions on Knowledge and Data Engineering 33 (6), 2776-2789, 2019
572019
Tsgn: Transaction subgraph networks for identifying ethereum phishing accounts
J Wang, P Chen, S Yu, Q Xuan
Blockchain and Trustworthy Systems: Third International Conference, BlockSys …, 2021
322021
Sampling subgraph network with application to graph classification
J Wang, P Chen, B Ma, J Zhou, Z Ruan, G Chen, Q Xuan
IEEE Transactions on Network Science and Engineering 8 (4), 3478-3490, 2021
132021
Tsgn: Transaction subgraph networks assisting phishing detection in ethereum
J Wang, P Chen, X Xu, J Wu, M Shen, Q Xuan, X Yang
arXiv preprint arXiv:2208.12938, 2022
112022
Understanding ethereum transactions via network approach
Y Xie, J Zhou, J Wang, J Zhang, Y Sheng, J Wu, Q Xuan
Graph Data Mining: Algorithm, Security and Application, 155-176, 2021
82021
Adversarial detection on graph structured data
J Chen, H Xu, J Wang, Q Xuan, X Zhang
Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in …, 2020
82020
The Robustness of Graph k-Shell Structure Under Adversarial Attacks
B Zhou, Y Lv, Y Mao, J Wang, S Yu, Q Xuan
IEEE Transactions on Circuits and Systems II: Express Briefs 69 (3), 1797-1801, 2021
72021
Adversarial attacks to scale-free networks: Testing the robustness of physical criteria
Q Xuan, Y Shan, J Wang, Z Ruan, G Chen
arXiv preprint arXiv:2002.01249, 2020
72020
Understanding the dynamics of DNNs using graph modularity
Y Lu, W Yang, Y Zhang, Z Chen, J Chen, Q Xuan, Z Wang, X Yang
European Conference on Computer Vision, 225-242, 2022
52022
Attacking the core structure of complex network
B Zhou, Y Lv, J Wang, J Zhang, Q Xuan
IEEE Transactions on Computational Social Systems, 2022
52022
Adversarial attacks on graphs: How to hide your structural information
Y Shan, J Zhu, Y Xie, J Wang, J Zhou, B Zhou, Q Xuan
Graph Data Mining: Algorithm, Security and Application, 93-120, 2021
32021
Broad learning based on subgraph networks for graph classification
J Wang, P Chen, Y Xie, Y Shan, Q Xuan, G Chen
Graph Data Mining: Algorithm, Security and Application, 49-71, 2021
32021
Multi-Modal Representation Learning for Molecular Property Prediction: Sequence, Graph, Geometry
Z Wang, T Jiang, J Wang, Q Xuan
arXiv preprint arXiv:2401.03369, 2024
22024
Adversarial attack on BC classification for scale-free networks
Q Xuan, Y Shan, J Wang, Z Ruan, G Chen
Chaos: An Interdisciplinary Journal of Nonlinear Science 30 (8), 2020
22020
Single Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning
D Chen, J Zhang, Y Lv, J Wang, H Ni, S Yu, Z Wang, Q Xuan
arXiv preprint arXiv:2305.02901, 2023
12023
Find Your Meal Pal: A Case Study on Yelp Network
J Zhang, J Xia, L Li, B Shen, J Wang, Q Xuan
Graph Data Mining: Algorithm, Security and Application, 177-188, 2021
12021
Targeted k-node collapse problem: Towards understanding the robustness of local k-core structure
Y Lv, B Zhou, J Wang, Q Xuan
Physica A: Statistical Mechanics and its Applications, 129732, 2024
2024
MONA: An Efficient and Scalable Strategy for Targeted k-Nodes Collapse
Y Lv, B Zhou, J Wang, S Yu, Q Xuan
IEEE Transactions on Circuits and Systems II: Express Briefs, 2024
2024
Null Model-Based Data Augmentation for Graph Classification
Z Wang, J Wang, Y Shan, S Yu, X Xu, Q Xuan, G Chen
IEEE Transactions on Network Science and Engineering, 2023
2023
GA-Based Multipopulation Synergistic Gene Screening Strategy on Critical Nodes Detection
S Yu, J Li, X Fang, Y Wang, J Wang, Q Xuan, C Fu
IEEE Transactions on Computational Social Systems, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20