1 code implementation • 23 Oct 2023 • Yuanjun Shi, Linzhi Wu, Minglai Shao
In practice, these dominant pipeline models may be limited in computational efficiency and generalization capacity because of non-parallel inference and context-free discrete label embeddings.
no code implementations • 12 Sep 2022 • Yuanjun Shi
Anomaly detection on the attributed network has recently received increasing attention in many research fields, such as cybernetic anomaly detection and financial fraud detection.