Publisher
Springer International Publishing
Reference23 articles.
1. Albert, R., Jeong, H., Barabási, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378–382 (2000)
2. Ben-Ameur, W., Neto, J.: A constraint generation algorithm for large scale linear programs using multiple-points separation. Math. Program. 107(3), 517–537 (2006)
3. Benson, A.R., Abebe, R., Schaub, M.T., Jadbabaie, A., Kleinberg, J.: Simplicial closure and higher-order link prediction. Proc. Nat. Acad. Sci. 115(48), E11221–E11230 (2018)
4. Bojchevski, A., Günnemann, S.: Adversarial attacks on node embeddings via graph poisoning. In: ICML, pp. 695–704 (2019)
5. Dahlhaus, E., Johnson, D.S., Papadimitriou, C.H., Seymour, P.D., Yannakakis, M.: The complexity of multiterminal cuts. SIAM J. Comput. 23(4), 864–894 (1994)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Network Design Through Graph Neural Networks: Identifying Challenges and Improving Performance;Studies in Computational Intelligence;2024
2. Attacking Shortest Paths by Cutting Edges;ACM Transactions on Knowledge Discovery from Data;2023-11-14
3. Towards Explainable Road Navigation Systems;2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC);2023-09-24
4. Graph-Based Temporal Process Planning and Scheduling for Well Drilling Operations;Day 2 Mon, February 20, 2023;2023-03-07
5. Alternative Route-Based Attacks in Metropolitan Traffic Systems;2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W);2022-06