no code implementations • 24 Apr 2022 • Jiaxin Liu, Yuefei Lyu, Xi Zhang, Sihong Xie
We first identify subgroup structures in the review graph that lead to discrepant accuracy in the groups.
no code implementations • 15 Jan 2022 • Yuefei Lyu, Xiaoyu Yang, Jiaxin Liu, Philip S. Yu, Sihong Xie, Xi Zhang
To discover subtle vulnerabilities, we design a powerful attacking algorithm to camouflage rumors in social networks based on reinforcement learning that can interact with and attack any black-box detectors.