Hi abojchevski,
I've already run your example, it worked perfectly and reproduced results in your paper.
However, I wonder how to run the other models, like $A_{DW_2}$, which seems works better than $A_{DW_3}$ in your paper.
Besides, I also want to know how to conduct a targeted attack by your codes, and with setting like adding edges instead of removing.
Thanks in advance.
Hi abojchevski,
I've already run your example, it worked perfectly and reproduced results in your paper.
However, I wonder how to run the other models, like$A_{DW_2}$ , which seems works better than $A_{DW_3}$ in your paper.
Besides, I also want to know how to conduct a targeted attack by your codes, and with setting like adding edges instead of removing.
Thanks in advance.