GuanZihan / GNN_backdoor_detection
Implementation of XGBD: Explanation-Guided Backdoor Detection on Graphs
☆10Updated 2 years ago
Alternatives and similar repositories for GNN_backdoor_detection
Users that are interested in GNN_backdoor_detection are comparing it to the libraries listed below
Sorting:
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆57Updated last year
- ☆55Updated 2 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆38Updated 3 years ago
- ☆32Updated 3 years ago
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆11Updated 2 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆11Updated 8 months ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆48Updated 2 years ago
- ☆28Updated 2 years ago
- ☆16Updated 3 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆23Updated 2 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆22Updated last year
- A list of recent adversarial attack and defense papers (including those on large language models)☆38Updated this week
- ☆14Updated 4 years ago
- ☆33Updated last year
- ☆66Updated 4 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆47Updated last year
- Locally Private Graph Neural Networks (ACM CCS 2021)☆46Updated last year
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆30Updated 3 years ago
- Defending graph neural networks against adversarial attacks (NeurIPS 2020)☆64Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆47Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- ☆24Updated 2 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆69Updated last year
- ☆23Updated 8 months ago
- ☆81Updated 3 years ago
- The code of paper "Adversarial Label-Flipping Attack and Defense for Graph Neural Networks" (ICDM 2020)☆18Updated 4 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆290Updated 9 months ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆22Updated last year
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆34Updated 9 months ago
- Model Poisoning Attack to Federated Recommendation☆32Updated 3 years ago