GuanZihan / GNN_backdoor_detectionLinks
Implementation of XGBD: Explanation-Guided Backdoor Detection on Graphs
☆10Updated 2 years ago
Alternatives and similar repositories for GNN_backdoor_detection
Users that are interested in GNN_backdoor_detection are comparing it to the libraries listed below
Sorting:
- ☆58Updated 3 years ago
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆61Updated last year
- A list of recent adversarial attack and defense papers (including those on large language models)☆44Updated last week
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆40Updated 4 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆301Updated 2 months ago
- ☆32Updated 3 years ago
- ☆28Updated 2 years ago
- ☆33Updated 2 years ago
- Backdoor Stuff in AI/ ML domain☆28Updated last week
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆24Updated 2 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23Updated 2 years ago
- Membership Inference Attack against Graph Neural Networks☆12Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated 2 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆388Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆299Updated 11 months ago
- Code for ML Doctor☆91Updated last year
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Updated 3 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆53Updated 3 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆41Updated last year
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Updated 4 years ago
- ☆66Updated 5 years ago
- ☆27Updated last year
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆273Updated 9 months ago
- ☆26Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆74Updated last year
- ☆16Updated 4 years ago
- ☆194Updated 2 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆221Updated last year