Searched for: subject%3A%22Networking%22
(1 - 14 of 14)
document
Neagu, Alex (author)
As the power system grows more complex and active, equivalent models have become a solution for modelling parts of the network that have limited observability or are confidential or too complex to simulate otherwise. In the past decade, this topic has also made its way to distribution networks because of its transition towards an active network,...
master thesis 2024
document
Olatunji, Iyiola E (author), Rathee, Mandeep (author), Funke, Thorben (author), Khosla, M. (author)
Privacy and interpretability are two important ingredients for achieving trustworthy machine learning. We study the interplay of these two aspects in graph machine learning through graph reconstruction attacks. The goal of the adversary here is to reconstruct the graph structure of the training data given access to model explanations. Based on...
conference paper 2023
document
Xu, J. (author), Abad, Gorka (author), Picek, S. (author)
Backdoor attacks have been demonstrated as a security threat for machine learning models. Traditional backdoor attacks intend to inject backdoor functionality into the model such that the backdoored model will perform abnormally on inputs with predefined backdoor triggers and still retain state-of-the-art performance on the clean inputs. While...
conference paper 2023
document
Liu, Y. (author), Xie, H. (author), Presekal, A. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Synthetic networks aim at generating realistic projections of real-world networks while concealing the actual system information. This paper proposes a scalable and effective approach based on graph neural networks (GNN) to generate synthetic topologies of Cyber-Physical power Systems (CPS) with realistic network feature distribution. In order...
journal article 2023
document
Isufi, E. (author), Gama, Fernando (author), Ribeiro, Alejandro (author)
Driven by the outstanding performance of neural networks in the structured euclidean domain, recent years have seen a surge of interest in developing neural networks for graphs and data supported on graphs. The graph is leveraged at each layer of the neural network as a parameterization to capture detail at the node level with a reduced...
journal article 2022
document
Rittig, J. (author), Ritzert, Martin (author), Schweidtmann, A.M. (author), Winkler, Stefanie (author), Weber, J.M. (author), Morsch, Philipp (author), Heufer, Karl Alexander (author), Grohe, Martin (author), Mitsos, Alexander (author), Dahmen, Manuel (author)
Fuels with high-knock resistance enable modern spark-ignition engines to achieve high efficiency and thus low CO<sub>2</sub> emissions. Identification of molecules with desired autoignition properties indicated by a high research octane number and a high octane sensitivity is therefore of great practical relevance and can be supported by...
journal article 2022
document
Xu, J. (author), Picek, S. (author)
Graph Neural Networks (GNNs) have achieved impressive results in various graph learning tasks. They have found their way into many applications, such as fraud detection, molecular property prediction, or knowledge graph reasoning. However, GNNs have been recently demonstrated to be vulnerable to backdoor attacks. In this work, we explore a...
conference paper 2022
document
Xu, J. (author), Wang, R. (author), Koffas, S. (author), Liang, K. (author), Picek, S. (author)
Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to...
conference paper 2022
document
Xu, J. (author), Xue, Minhui (author), Picek, S. (author)
Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works on backdoor attacks on neural networks, but only a few works consider graph neural...
conference paper 2021
document
Pietrak, Jakub (author)
Graph Neural Networks are a unique type of Deep Learning models that have a capability to exploit an explicitly stated structure of data representation. By design they carry a strong relational inductive bias, which is a set of assumptions that makes the algorithm prioritize some solutions over another, independent of observed data. This makes...
master thesis 2020
document
Iancu, A. (author), Isufi, E. (author)
Atrial electrograms are often used to gain understanding on the development of atrial fibrillation (AF). Using such electrograms, cardiologists can reconstruct how the depolarization wave-front propagates across the atrium. Knowing the exact moment at which the depolarization wavefront in the tissue reaches each electrode is an important aspect...
conference paper 2020
document
Iancu, Bianca (author)
Network data are essential in applications such as recommender systems, social networks, and sensor networks. A unique characteristic that these data encompass is the coupling between the data values and the underlying network structure on which these data are defined. Graph Neural Networks (GNNs) have been designed as tools to extend the...
master thesis 2020
document
Gama, Fernando (author), Marques, Antonio G. (author), Leus, G.J.T. (author), Ribeiro, Alejandro (author)
Convolutional neural networks (CNNs) restrict the, otherwise arbitrary, linear operation of neural networks to be a convolution with a bank of learned filters. This makes them suitable for learning tasks based on data that exhibit the regular structure of time signals and images. The use of convolutions, however, makes them unsuitable for...
conference paper 2019
document
Gama, F. (author), Marques, Antonio G. (author), Ribeiro, Alejandro (author), Leus, G.J.T. (author)
Graph neural networks (GNNs) regularize classical neural networks by exploiting the underlying irregular structure supporting graph data, extending its application to broader data domains. The aggregation GNN presented here is a novel GNN that exploits the fact that the data collected at a single node by means of successive local exchanges...
conference paper 2019
Searched for: subject%3A%22Networking%22
(1 - 14 of 14)