Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real-world applications such as fraud and intrusion detection. Existing approaches have difficulties with three major issues: sparsity and nonlinearity capturing, residual modeling, and network smoothing. We propose Residual Graph Convolutional Network (ResGCN), an attention-based deep residual modeling approach that can tackle these issues: modeling the attributed networks with GCN allows to capture the sparsity and nonlinearity, utilizing a deep neural network allows direct residual ing from the input, and a residual-based attention mechanism reduces the adverse effect from anomalous nodes and prevents over-smoothing. Extensive experiments on s...
Neural networks have been proved to perform well in network intrusion detection. In order to acquire...
As a specially designed tool and technique for the detection of image steganography, image steganaly...
Learning powerful discriminative features is the key for machine fault diagnosis. Most existing meth...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
The project's objective is to detect network anomalies happening in a telecommunication network due ...
Graph neural networks (GNNs) have been very successful at solving fraud detection tasks. The GNN-bas...
Graph convolutional networks (GCNs) have been proved to be very practical to handle various graph-re...
Graph convolution is a fundamental building block for many deep neural networks on graph-structured ...
Image steganalysis is to discriminate innocent images and those suspected images with hidden message...
Detecting abnormal nodes from attributed networks is of great importance in many real applications, ...
Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important ...
Advanced Persistent Threats (APTs) are the most sophisticated attacks for modern information systems...
Learning powerful discriminative features is the key for machine fault diagnosis. Most existing meth...
Image denoising is a thoroughly studied research problem in the areas of image processing and comput...
Neural networks have been proved to perform well in network intrusion detection. In order to acquire...
As a specially designed tool and technique for the detection of image steganography, image steganaly...
Learning powerful discriminative features is the key for machine fault diagnosis. Most existing meth...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
The project's objective is to detect network anomalies happening in a telecommunication network due ...
Graph neural networks (GNNs) have been very successful at solving fraud detection tasks. The GNN-bas...
Graph convolutional networks (GCNs) have been proved to be very practical to handle various graph-re...
Graph convolution is a fundamental building block for many deep neural networks on graph-structured ...
Image steganalysis is to discriminate innocent images and those suspected images with hidden message...
Detecting abnormal nodes from attributed networks is of great importance in many real applications, ...
Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important ...
Advanced Persistent Threats (APTs) are the most sophisticated attacks for modern information systems...
Learning powerful discriminative features is the key for machine fault diagnosis. Most existing meth...
Image denoising is a thoroughly studied research problem in the areas of image processing and comput...
Neural networks have been proved to perform well in network intrusion detection. In order to acquire...
As a specially designed tool and technique for the detection of image steganography, image steganaly...
Learning powerful discriminative features is the key for machine fault diagnosis. Most existing meth...