“…Indeed, many SSL methods rely on a cluster assumption: labels of close-by data points are similar [5], [10]- [12]. This assumption is at the heart of many successful methods in graph signal processing [13], imaging [14], trend filtering [15], anomaly detection [16], information retrieval [17], and social networks [4]. We implement this Parts of this work have been presented in the conference paper [1].…”