You are currently on the new version of our website. Access the old version .

136 Results Found

  • Article
  • Open Access
5 Citations
2,373 Views
17 Pages

Detecting Pseudo-Manipulated Citations in Scientific Literature through Perturbations of the Citation Graph

  • Renata Avros,
  • Saar Keshet,
  • Dvora Toledano Kitai,
  • Evgeny Vexler and
  • Zeev Volkovich

6 September 2023

Ensuring the integrity of scientific literature is essential for advancing knowledge and research. However, the credibility and trustworthiness of scholarly publications are compromised by manipulated citations. Traditional methods, such as manual in...

  • Article
  • Open Access
2,142 Views
24 Pages

Direct Determination of Reduced Models of a Class of Singularly Perturbed Nonlinear Systems on Three Time Scales in a Bond Graph Approach

  • Gerardo Ayala-Jaimes,
  • Gilberto Gonzalez-Avalos,
  • Noe Barrera Gallegos,
  • Aaron Padilla Garcia and
  • Juancarlos Méndez-Barriga

8 January 2022

One of the most important features in the analysis of the singular perturbation methods is the reduction of models. Likewise, the bond graph methodology in dynamic system modeling has been widely used. In this paper, the bond graph modeling of nonlin...

  • Article
  • Open Access
3 Citations
2,002 Views
15 Pages

Spotting Suspicious Academic Citations Using Self-Learning Graph Transformers

  • Renata Avros,
  • Mor Ben Haim,
  • Almog Madar,
  • Elena Ravve and
  • Zeev Volkovich

10 March 2024

The study introduces a novel approach to identify potential citation manipulation within academic papers. This method utilizes perturbations of a deep embedding model, integrating Graph-Masked Autoencoders to merge textual information with evidence o...

  • Article
  • Open Access
913 Views
19 Pages

Mitigating an Epidemic on a Geographic Network Using Vaccination

  • Mohamad Badaoui,
  • Jean-Guy Caputo,
  • Gustavo Cruz-Pacheco and
  • Arnaud Knippel

5 November 2024

We consider a mathematical model describing the propagation of an epidemic on a geographical network. The size of the outbreak is governed by the initial growth rate of the disease given by the maximal eigenvalue of the epidemic matrix formed by the...

  • Article
  • Open Access
8 Citations
3,164 Views
15 Pages

19 December 2020

In this work, the Fenton technology was applied to decolorize methylene blue (MB) and to inactivate Escherichia coli K12, used as recalcitrant compound and bacteria models respectively, in order to provide an approach into single and combinative effe...

  • Article
  • Open Access
292 Views
23 Pages

Analyzing the Properties of Graph Neural Networks with Evolutionary Algorithms

  • Zhaowei Liu,
  • Zhifei Lu,
  • Haiyang Wang,
  • Dawei Chen,
  • Shaoyu Wang,
  • Jie Chu,
  • Rufei Gao and
  • Anzuo Jiang

31 December 2025

Graph Neural Networks (GNNs) have achieved remarkable success in graph structure learning, but recent research reveals their vulnerability to carefully designed perturbations. To address this, ProGNN, a GNN model based on graph properties, was propos...

  • Article
  • Open Access
6 Citations
2,182 Views
24 Pages

6 August 2021

We consider a general second order self-adjoint elliptic operator on an arbitrary metric graph, to which a small graph is glued. This small graph is obtained via rescaling a given fixed graph γ by a small positive parameter ε. The coefficients in the...

  • Article
  • Open Access
1,442 Views
16 Pages

3 May 2025

Graph neural networks (GNNs) are widely used for graph-structured data. However, GNNs are vulnerable to membership inference attacks (MIAs) in graph classification tasks, which determine whether a graph was in the training set, risking the leakage of...

  • Article
  • Open Access
8 Citations
4,637 Views
18 Pages

16 December 2022

The application of cybersecurity knowledge graphs is attracting increasing attention. However, many cybersecurity knowledge graphs are incomplete due to the sparsity of cybersecurity knowledge. Existing knowledge graph completion methods do not perfo...

  • Article
  • Open Access
1,739 Views
21 Pages

A Learning Resource Recommendation Method Based on Graph Contrastive Learning

  • Jiu Yong,
  • Jianguo Wei,
  • Xiaomei Lei,
  • Jianwu Dang,
  • Wenhuan Lu and
  • Meijuan Cheng

The existing learning resource recommendation systems suffer from data sparsity and missing data labels, leading to the insufficient mining of the correlation between users and courses. To address these issues, we propose a learning resource recommen...

  • Article
  • Open Access
956 Views
16 Pages

8 October 2025

Graph Neural Networks (GNNs) capture complex information in graph-structured data by integrating node features with iterative updates of graph topology. However, they inherently rely on the homophily assumption—that nodes of the same class tend...

  • Article
  • Open Access
2 Citations
2,113 Views
15 Pages

Towards Automatic ICD Coding via Label Graph Generation

  • Peng Nie,
  • Huanqin Wu and
  • Zhanchuan Cai

1 August 2024

Automatic International Classification of Disease (ICD) coding, a system for assigning proper codes to a given clinical text, has received increasing attention. Previous studies have focused on formulating the ICD coding task as a multi-label predict...

  • Article
  • Open Access
4 Citations
1,684 Views
15 Pages

Entity Alignment with Global Information Aggregation

  • Liguo Zhang,
  • Zhao Li,
  • Ye Li,
  • Shiwei Wu and
  • Tong Chen

Entity alignment (EA) is a critical task in knowledge graph fusion, aiming to associate equivalent entities across disparate knowledge graphs (KGs). Current methods typically leverage entity representations derived from triples or neighboring entitie...

  • Article
  • Open Access
28 Citations
2,610 Views
10 Pages

8 June 2022

The symmetry design of the system contains integer partial differential equations and fractional-order partial differential equations with fractional derivative. In this paper, we develop a scheme to examine fractional-order shock wave equations and...

  • Article
  • Open Access
5 Citations
1,500 Views
8 Pages

The main purpose of this article is to investigate the dynamic behavior and optical soliton for the M-truncated fractional paraxial wave equation arising in a liquid crystal model, which is usually used to design camera lenses for high-quality photog...

  • Article
  • Open Access
2 Citations
1,522 Views
20 Pages

10 October 2024

Adversarial attacks on Graph Neural Networks (GNNs) have emerged as a significant threat to the security of graph learning. Compared with Graph Modification Attacks (GMAs), Graph Injection Attacks (GIAs) are considered more realistic attacks, in whic...

  • Article
  • Open Access
873 Views
19 Pages

23 May 2025

The increasing demand for real-time multimedia communications has driven the need for highly secure and computationally efficient encryption schemes. In this work, we present a novel chaos-based encryption system that provides remarkable levels of se...

  • Article
  • Open Access
19 Citations
4,318 Views
17 Pages

21 October 2020

Joint named entity recognition and relation extraction is an essential natural language processing task that aims to identify entities and extract the corresponding relations in an end-to-end manner. At present, compared with the named entity recogni...

  • Article
  • Open Access
4 Citations
1,851 Views
13 Pages

On the Solution of Fractional Biswas–Milovic Model via Analytical Method

  • Pongsakorn Sunthrayuth,
  • Muhammad Naeem,
  • Nehad Ali Shah,
  • Rasool Shah and
  • Jae Dong Chung

11 January 2023

Through the use of a unique approach, we study the fractional Biswas–Milovic model with Kerr and parabolic law nonlinearities in this paper. The Caputo approach is used to take the fractional derivative. The method employed here is the homotopy...

  • Article
  • Open Access
4 Citations
3,738 Views
45 Pages

24 February 2023

We consider the general framework of perturbative quantum field theory for the pure Yang–Mills model. We give a more precise version of the Wick theorem using Hopf algebra notations for chronological products and not for Feynman graphs. Next, w...

  • Article
  • Open Access
8 Citations
3,450 Views
16 Pages

High-Order Topology-Enhanced Graph Convolutional Networks for Dynamic Graphs

  • Jiawei Zhu,
  • Bo Li,
  • Zhenshi Zhang,
  • Ling Zhao and
  • Haifeng Li

21 October 2022

Understanding the evolutionary mechanisms of dynamic graphs is crucial since dynamic is a basic characteristic of real-world networks. The challenges of modeling dynamic graphs are as follows: (1) Real-world dynamics are frequently characterized by g...

  • Article
  • Open Access
8 Citations
2,781 Views
12 Pages

12 September 2023

The minimum vertex cover (MVC) problem is a canonical NP-hard combinatorial optimization problem aiming to find the smallest set of vertices such that every edge has at least one endpoint in the set. This problem has extensive applications in cyberse...

  • Article
  • Open Access
6 Citations
5,967 Views
22 Pages

1 March 2018

Designing robust circuits that withstand environmental perturbation and device degradation is critical for many applications. Traditional robust circuit design is mainly done by tuning parameters to improve system robustness. However, the topological...

  • Article
  • Open Access
1,181 Views
17 Pages

Boosting Clean-Label Backdoor Attacks on Graph Classification

  • Yadong Wang,
  • Zhiwei Zhang,
  • Ye Yuan and
  • Guoren Wang

13 September 2025

Graph Neural Networks (GNNs) have become a cornerstone for graph classification, yet their vulnerability to backdoor attacks remains a significant security concern. While clean-label attacks provide a stealthier approach by preserving original labels...

  • Article
  • Open Access
37 Citations
3,070 Views
17 Pages

17 February 2022

This article presents a homotopy perturbation transform method and a variational iterative transform method for analyzing the fractional-order non-linear system of the unsteady flow of a polytropic gas. In this method, the Yang transform is combined...

  • Article
  • Open Access
1 Citations
3,119 Views
17 Pages

A Lightweight Method for Defense Graph Neural Networks Adversarial Attacks

  • Zhi Qiao,
  • Zhenqiang Wu,
  • Jiawang Chen,
  • Ping’an Ren and
  • Zhiliang Yu

25 December 2022

Graph neural network has been widely used in various fields in recent years. However, the appearance of an adversarial attack makes the reliability of the existing neural networks challenging in application. Premeditated attackers, can make very smal...

  • Article
  • Open Access
1 Citations
867 Views
25 Pages

12 May 2025

This article describes an effective computing method for singularly perturbed parabolic problems with small negative shifts in convection and reaction terms. To handle the small negative shifts, the Taylor series expansion is used. The asymptotically...

  • Feature Paper
  • Article
  • Open Access
16 Citations
5,766 Views
14 Pages

Carbon Nanotubes’ Effect on Mitochondrial Oxygen Flux Dynamics: Polarography Experimental Study and Machine Learning Models using Star Graph Trace Invariants of Raman Spectra

  • Michael González-Durruthy,
  • Jose M. Monserrat,
  • Bakhtiyor Rasulev,
  • Gerardo M. Casañola-Martín,
  • José María Barreiro Sorrivas,
  • Sergio Paraíso-Medina,
  • Víctor Maojo,
  • Humberto González-Díaz,
  • Alejandro Pazos and
  • Cristian R. Munteanu

11 November 2017

This study presents the impact of carbon nanotubes (CNTs) on mitochondrial oxygen mass flux (Jm) under three experimental conditions. New experimental results and a new methodology are reported for the first time and they are based on CNT Raman spect...

  • Article
  • Open Access
2,365 Views
20 Pages

Summarizing source code by natural language aims to help developers better understand existing code, making software development more efficient. Since source code is highly structured, recent research uses code structure information like Abstract Sem...

  • Article
  • Open Access
999 Views
15 Pages

Graph Anomaly Detection Algorithm Based on Multi-View Heterogeneity Resistant Network

  • Yangrui Fan,
  • Caixia Cui,
  • Zhiqiang Wang,
  • Hui Qi and
  • Zhen Tian

14 November 2025

Graph anomaly detection (GAD) aims to identify nodes or edges that deviate from normal patterns. However, the presence of heterophilic edges in graphs leads to feature over-smoothing issues. To overcome this limitation, this paper proposes the multi-...

  • Article
  • Open Access
8 Citations
4,134 Views
20 Pages

12 October 2021

In the last decades, resilience became officially the worldwide cornerstone to reduce the risk of disasters and improve preparedness, response, and recovery capacities. Although the concept of resilience is now clear, it is still under debate how to...

  • Article
  • Open Access
1,506 Views
27 Pages

12 September 2025

Graph Neural Networks (GNNs) face fundamental algorithmic challenges in real-world applications due to a combination of data heterogeneity, adversarial heterophily, and severe class imbalance. A critical research gap exists for a unified framework th...

  • Article
  • Open Access
1 Citations
3,243 Views
17 Pages

26 October 2023

In this study, we design an algorithm to work on gate-based quantum computers. Based on the algorithm, we construct a quantum circuit that represents the surplus process of a cedant under a reinsurance agreement. This circuit takes into account a var...

  • Article
  • Open Access
21 Citations
5,488 Views
16 Pages

Investigation of Fractional Nonlinear Regularized Long-Wave Models via Novel Techniques

  • Muhammad Naeem,
  • Humaira Yasmin,
  • Rasool Shah,
  • Nehad Ali Shah and
  • Kamsing Nonlaopon

12 January 2023

The main goal of the current work is to develop numerical approaches that use the Yang transform, the homotopy perturbation method (HPM), and the Adomian decomposition method to analyze the fractional model of the regularized long-wave equation. The...

  • Article
  • Open Access
1 Citations
1,273 Views
21 Pages

Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection

  • Hao Yan,
  • Jianming Li,
  • Lei Du,
  • Binxing Fang,
  • Yan Jia and
  • Zhaoquan Gu

16 July 2025

The rapid development of information technology has made cyberspace security an increasingly critical issue. Network intrusion detection methods are practical approaches to protecting network systems from cyber attacks. However, cyberspace security t...

  • Article
  • Open Access
2 Citations
1,164 Views
18 Pages

31 August 2025

Accurate genome binning is essential for resolving microbial community structure and functional potential from metagenomic data. However, existing approaches—primarily reliant on tetranucleotide frequency (TNF) and abundance profiles—ofte...

  • Article
  • Open Access
1,539 Views
17 Pages

14 August 2025

Time series clustering finds wide application but is often limited by data quality and the inherent limitations of existing methods. Compared to high-dimensional structured data like images, the low-dimensional features of time series contain less in...

  • Article
  • Open Access
3 Citations
2,375 Views
18 Pages

18 November 2022

To adapt to complex navigation conditions, this paper addresses the coordination formation of autonomous surface vehicles (ASVs) with the constraint of information interruption. For this purpose, a distributed robust fast finite-time formation contro...

  • Article
  • Open Access
1 Citations
6,896 Views
11 Pages

6 August 2009

If the Hamiltonian in the time independent Schrödinger equation, HΨ = EΨ, is invariant under a group of symmetry transformations, the theory of group representations can help obtain the eigenvalues and eigenvectors of H. A finite group that is not a...

  • Article
  • Open Access
12 Citations
5,084 Views
14 Pages

Robust Graph Neural Networks via Ensemble Learning

  • Qi Lin,
  • Shuo Yu,
  • Ke Sun,
  • Wenhong Zhao,
  • Osama Alfarraj,
  • Amr Tolba and
  • Feng Xia

14 April 2022

Graph neural networks (GNNs) have demonstrated a remarkable ability in the task of semi-supervised node classification. However, most existing GNNs suffer from the nonrobustness issues, which poses a great challenge for applying GNNs into sensitive s...

  • Article
  • Open Access
2 Citations
2,497 Views
15 Pages

A Comparative Analysis of Fractional-Order Gas Dynamics Equations via Analytical Techniques

  • Shuang-Shuang Zhou,
  • Nehad Ali Shah,
  • Ioannis Dassios,
  • S. Saleem and
  • Kamsing Nonlaopon

22 July 2021

This article introduces two well-known computational techniques for solving the time-fractional system of nonlinear equations of unsteady flow of a polytropic gas. The methods suggested are the modified forms of the variational iteration method and t...

  • Article
  • Open Access
1 Citations
2,029 Views
12 Pages

21 May 2021

This paper investigates the leader-following regional multiple-bipartite consensus problems of networked Lagrangian systems (NLSs) in coopetition networks. Our framework expands the application scopes of traditional regional consensus in cooperative...

  • Article
  • Open Access
24 Citations
2,170 Views
18 Pages

19 June 2023

In this study, we used two unique approaches, namely the Yang transform decomposition method (YTDM) and the homotopy perturbation transform method (HPTM), to derive approximate analytical solutions for nonlinear time-fractional Zakharov–Kuznets...

  • Article
  • Open Access
3 Citations
1,486 Views
25 Pages

19 September 2024

In the present article, the method which was obtained from a combination of the conformable fractional double Laplace transform method (CFDLTM) and the homotopy perturbation method (HPM) was successfully applied to solve linear and nonlinear conforma...

  • Article
  • Open Access
1 Citations
1,174 Views
25 Pages

12 September 2023

A general lack of understanding pertaining to deep feedforward neural networks (DNNs) can be attributed partly to a lack of tools with which to analyze the composition of non-linear functions, and partly to a lack of mathematical models applicable to...

  • Article
  • Open Access
9 Citations
2,273 Views
19 Pages

A Comparative Analysis of Fractional-Order Fokker–Planck Equation

  • Fatemah Mofarreh,
  • Asfandyar Khan,
  • Rasool Shah and
  • Alrazi Abdeljabbar

6 February 2023

The importance of partial differential equations in physics, mathematics and engineering cannot be emphasized enough. Partial differential equations are used to represent physical processes, which are then solved analytically or numerically to examin...

  • Article
  • Open Access
6 Citations
4,776 Views
20 Pages

Diagnosing Bias and Instability in LLM Evaluation: A Scalable Pairwise Meta-Evaluator

  • Catalin Anghel,
  • Andreea Alexandra Anghel,
  • Emilia Pecheanu,
  • Adina Cocu,
  • Adrian Istrate and
  • Constantin Adrian Andrei

31 July 2025

The evaluation of large language models (LLMs) increasingly relies on other LLMs acting as automated judges. While this approach offers scalability and efficiency, it raises serious concerns regarding evaluator reliability, positional bias, and ranki...

  • Article
  • Open Access
13 Citations
3,094 Views
16 Pages

Steady Magnetohydrodynamic Micropolar Fluid Flow and Heat and Mass Transfer in Permeable Channel with Thermal Radiation

  • Vandana Agarwal,
  • Bhupander Singh,
  • Amrita Kumari,
  • Wasim Jamshed,
  • Kottakkaran Sooppy Nisar,
  • Abdulrazak H. Almaliki and
  • H. Y. Zahran

23 December 2021

The present work is devoted to the study of magnetohydrodynamic micropolar fluid flow in a permeable channel with thermal radiation. The Rosseland approximation for thermal radiation is taken into account in the modelling of heat transfer. The govern...

  • Article
  • Open Access
15 Citations
4,035 Views
21 Pages

14 February 2022

In this paper, we propose a global navigation function applied to model predictive control (MPC) for autonomous mobile robots, with application to warehouse automation. The approach considers static and dynamic obstacles and generates smooth, collisi...

of 3