Author of the publication

Graph Contrastive Backdoor Attacks.

, , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 40888-40910. PMLR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Value-based program characterization and its application to software plagiarism detection., , , , , and . ICSE, page 756-765. ACM, (2011)Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries., , , and . EuroS&P, page 1-16. IEEE, (2020)Automatic grading of programming assignments: an approach based on formal semantics., , , and . ICSE (SEET), page 126-137. IEEE / ACM, (2019)Automatic building information model query generation., , , , , , , and . J. Inf. Technol. Constr., (2015)Translingual Obfuscation., , , , and . EuroS&P, page 128-144. IEEE, (2016)Local Augmentation for Graph Neural Networks., , , , , , , and . CoRR, (2021)A first step towards algorithm plagiarism detection., , , , and . ISSTA, page 111-121. ACM, (2012)Distilling Knowledge on Text Graph for Social Media Attribute Inference., , , and . SIGIR, page 2024-2028. ACM, (2022)Local Augmentation for Graph Neural Networks., , , , , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 14054-14072. PMLR, (2022)FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning., , , , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22028-22041. PMLR, (2023)