Loading [MathJax]/extensions/MathMenu.js
Jiaqi Yu - IEEE Xplore Author Profile

Showing 1-5 of 5 results

Filter Results

Show

Results

Existing unsupervised graph anomaly detection (GAD) methods can be categorized into reconstruction based methods and contrastive learning based methods. The principle of reconstruction methods is to capture anomalous nodes based on data reconstruction errors. However, existing reconstruction methods are limited to a single scale reconstruction of graph structures, typically predicting edges solely...Show More
Synthetic aperture radar (SAR) has important applications in military, geology and other fields due to its high resolution and all-day, all-weather operation. However, the inherent speckle noise of SAR images seriously restricts the effectiveness of detection algorithms. To address this challenge, this paper proposes an open vocabulary SAR object detection model that combines a denoising network a...Show More
Applying deep learning network models in SAR image processing has significantly improved speed of target recognition performance. Nevertheless, due to the SAR imaging principle distinct from optical images, these models struggle to distinguish strong scattering characteristics from clutter, resulting in a high false alarm rate in applications of target recognition. To ensure correctness practicall...Show More
Federated graph neural networks aim to collabo-ratively train a global graph neural network across multiple clients while preserving privacy constraints. Existing federated graph neural networks fall into the category of federated learning on spatial graph neural networks which rarely consider the challenges of data noise and biased data distribution. To this end, we present a new class of Federat...Show More
Deep learning models are usually black boxes when deployed on machine learning platforms. Prior works have shown that the attributes (e.g., the number of convolutional layers) of a target black-box model can be exposed through a sequence of queries. There is a crucial limitation: these works assume the training dataset of the target model is known beforehand and leverage this dataset for model att...Show More