GuanZihan / GNN_backdoor_detectionLinks
Implementation of XGBD: Explanation-Guided Backdoor Detection on Graphs
☆10Updated 2 years ago
Alternatives and similar repositories for GNN_backdoor_detection
Users that are interested in GNN_backdoor_detection are comparing it to the libraries listed below
Sorting:
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆58Updated last year
- ☆57Updated 2 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆23Updated 2 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆40Updated 3 years ago
- ☆32Updated 3 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆52Updated 2 years ago
- ☆27Updated 2 years ago
- ☆17Updated 3 years ago
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆11Updated 2 years ago
- ☆14Updated 4 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆47Updated last year
- Backdoor Stuff in AI/ ML domain☆27Updated this week
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Updated 9 months ago
- ☆33Updated last year
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆62Updated 8 months ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23Updated 2 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Updated last year
- ☆11Updated 9 months ago
- Code for ML Doctor☆91Updated 10 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆37Updated 11 months ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆48Updated 3 years ago
- A list of recent adversarial attack and defense papers (including those on large language models)☆41Updated last week
- Implementation of Adversarial Privacy Graph Embedding in TensorFlow☆20Updated 5 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Updated 3 years ago
- ☆26Updated last year
- ☆24Updated 10 months ago
- Code for CCS '23 paper "Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian Estimation"☆14Updated last year
- ☆14Updated last year
- Code related to the paper "Machine Unlearning of Features and Labels"☆70Updated last year
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆290Updated 10 months ago