The code of paper "Adversarial Label-Flipping Attack and Defense for Graph Neural Networks" (ICDM 2020)
☆18Mar 19, 2021Updated 5 years ago
Alternatives and similar repositories for LafAK
Users that are interested in LafAK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Feb 26, 2023Updated 3 years ago
- Code for “ACE-HGNN: Adaptive Curvature ExplorationHyperbolic Graph Neural Network”☆17Mar 3, 2022Updated 4 years ago
- Source code for AAAI2023 "T2-GNN: Graph Neural Networks for Graphs with Incomplete Features and Structure via Teacher-Student Distillatio…☆15Feb 10, 2023Updated 3 years ago
- This is the repository for the AAAI 21 paper [Contrastive and Generative Graph Convolutional Networks for Graph-based Semi-Supervised Lea…☆18Feb 28, 2023Updated 3 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆51Jul 2, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- WWW2021: Interpreting and Unifying Graph Neural Networks with An Optimization Framework☆14Jun 23, 2021Updated 4 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- [PR 2021] Code for "GraphAIR: Graph Representation Learning with Neighborhood Aggregation and Interaction"☆12Aug 25, 2021Updated 4 years ago
- Code for TNNLS paper "Homophily-Enhanced Self-supervision for Graph Structure Learning: Insights and Directions"☆15Feb 27, 2024Updated 2 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago
- Associated codebase for Byzantine-resilient distributed / decentralized machine learning papers from INSPIRE Lab☆14Oct 11, 2021Updated 4 years ago
- Code for KDD'22 paper, COSTA: Covariance-Preserving Feature Augmentation for Graph Contrastive Learning☆49Jun 7, 2023Updated 2 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆55Feb 19, 2023Updated 3 years ago
- ☆14Apr 11, 2021Updated 5 years ago
- Offical pytorch implementation of proposed NRGNN and Compared Methods in "NRGNN: Learning a Label Noise-Resistant Graph Neural Network on…☆46Jul 5, 2022Updated 3 years ago
- A curated collection of adversarial attack and defense on graph data.☆585Nov 7, 2023Updated 2 years ago
- Code for "Position-aware Structure Learning for Graph Topology-imbalance by Relieving Under-reaching and Over-squashing"☆15Oct 1, 2023Updated 2 years ago
- ☆51Mar 24, 2023Updated 3 years ago
- codes of LEGNN for Semi-supervised Node Classification☆12Jun 1, 2022Updated 3 years ago
- Using WoLF (win or learn fast) PHC (policy hill climbing) algorithm to implement stochastic games☆15Jun 14, 2019Updated 6 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆48Aug 17, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- source code of IJCAI 2021 paper "Graph Representation with Curriculum Contrastive Learning"☆26Jul 7, 2021Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- The code reproduces the results of the experiments in the paper. In particular, it performs experiments in which machine-learning models …☆20Aug 16, 2021Updated 4 years ago
- A PyTorch implementation of "Can Large Language Models Improve the Adversarial Robustness of Graph Neural Networks?" (KDD 2025)☆29Nov 6, 2025Updated 6 months ago
- Spatial Mixture-of-Experts☆21Nov 29, 2022Updated 3 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- A System-Oriented Wargame Framework for Adversarial ML☆10Apr 24, 2023Updated 3 years ago
- ☆27Dec 15, 2022Updated 3 years ago
- Implementation of GCNH, a GNN for heterophilous graphs described in the paper "GCNH: A Simple Method For Representation Learning On Heter…☆12Apr 27, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆16Apr 29, 2024Updated 2 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 5 years ago
- Code for "Graph Neural Networks can Recover the Hidden Features Solely from the Graph Structure" (ICML 2023)☆24Jun 1, 2023Updated 2 years ago
- Code for the paper "Collaborative Graph Walk for Semi-supervised Multi-Label Node Classification" - ICDM 2019☆13Mar 25, 2023Updated 3 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆225May 31, 2022Updated 3 years ago
- A web-based tilemap editor for a custom 2D game engine.☆12Dec 1, 2025Updated 5 months ago
- ☆24Apr 29, 2022Updated 4 years ago