Picture for Thanh Trung Huynh

Thanh Trung Huynh

FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization

Add code
Oct 04, 2024
Figure 1 for FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization
Figure 2 for FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization
Figure 3 for FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization
Figure 4 for FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization
Viaarxiv icon

Heterogeneous Hypergraph Embedding for Recommendation Systems

Add code
Jul 04, 2024
Figure 1 for Heterogeneous Hypergraph Embedding for Recommendation Systems
Figure 2 for Heterogeneous Hypergraph Embedding for Recommendation Systems
Figure 3 for Heterogeneous Hypergraph Embedding for Recommendation Systems
Figure 4 for Heterogeneous Hypergraph Embedding for Recommendation Systems
Viaarxiv icon

Fast-FedUL: A Training-Free Federated Unlearning with Provable Skew Resilience

Add code
May 28, 2024
Viaarxiv icon

Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures

Add code
Apr 23, 2024
Figure 1 for Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Figure 2 for Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Figure 3 for Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Figure 4 for Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Viaarxiv icon

A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures

Add code
Mar 31, 2024
Figure 1 for A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Figure 2 for A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Figure 3 for A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Figure 4 for A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Viaarxiv icon

Efficient Integration of Multi-Order Dynamics and Internal Dynamics in Stock Movement Prediction

Add code
Nov 11, 2022
Figure 1 for Efficient Integration of Multi-Order Dynamics and Internal Dynamics in Stock Movement Prediction
Figure 2 for Efficient Integration of Multi-Order Dynamics and Internal Dynamics in Stock Movement Prediction
Figure 3 for Efficient Integration of Multi-Order Dynamics and Internal Dynamics in Stock Movement Prediction
Figure 4 for Efficient Integration of Multi-Order Dynamics and Internal Dynamics in Stock Movement Prediction
Viaarxiv icon

A Survey of Machine Unlearning

Add code
Sep 12, 2022
Figure 1 for A Survey of Machine Unlearning
Figure 2 for A Survey of Machine Unlearning
Figure 3 for A Survey of Machine Unlearning
Figure 4 for A Survey of Machine Unlearning
Viaarxiv icon

Detecting Rumours with Latency Guarantees using Massive Streaming Data

Add code
May 13, 2022
Figure 1 for Detecting Rumours with Latency Guarantees using Massive Streaming Data
Figure 2 for Detecting Rumours with Latency Guarantees using Massive Streaming Data
Figure 3 for Detecting Rumours with Latency Guarantees using Massive Streaming Data
Figure 4 for Detecting Rumours with Latency Guarantees using Massive Streaming Data
Viaarxiv icon

Link-Intensive Alignment for Incomplete Knowledge Graphs

Add code
Dec 17, 2021
Figure 1 for Link-Intensive Alignment for Incomplete Knowledge Graphs
Figure 2 for Link-Intensive Alignment for Incomplete Knowledge Graphs
Figure 3 for Link-Intensive Alignment for Incomplete Knowledge Graphs
Figure 4 for Link-Intensive Alignment for Incomplete Knowledge Graphs
Viaarxiv icon

A dual benchmarking study of facial forgery and facial forensics

Add code
Nov 25, 2021
Figure 1 for A dual benchmarking study of facial forgery and facial forensics
Figure 2 for A dual benchmarking study of facial forgery and facial forensics
Figure 3 for A dual benchmarking study of facial forgery and facial forensics
Figure 4 for A dual benchmarking study of facial forgery and facial forensics
Viaarxiv icon