Learning0411 / Knowledge-data-evaluationLinks
☆42Updated last year
Alternatives and similar repositories for Knowledge-data-evaluation
Users that are interested in Knowledge-data-evaluation are comparing it to the libraries listed below
Sorting:
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆60Updated 2 years ago
- ☆10Updated last year
- ☆57Updated 3 years ago
- ☆224Updated 5 months ago
- Some Conferences' accepted paper lists (including Network, Security, AI) 顶会近五年论文列表☆58Updated 3 months ago
- ☆33Updated 2 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆131Updated last year
- Source code for LDPTrace: Locally Differentially Private Trajectory Synthesis. VLDB 2023.☆28Updated 2 years ago
- ☆102Updated 2 years ago
- Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"☆25Updated last year
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆43Updated 4 years ago
- A Tool Kit for Crowdsourcing Learning☆29Updated 7 months ago
- ☆29Updated 2 years ago
- ☆11Updated 3 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆91Updated last year
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Updated 3 years ago
- Membership Inference Attack against Graph Neural Networks☆13Updated 3 years ago
- ☆32Updated 6 months ago
- ☆17Updated 8 months ago
- ☆23Updated 3 years ago
- 使用pytorch实现FGSM☆32Updated 4 years ago
- ☆26Updated last year
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16Updated last year
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆175Updated 8 months ago
- ☆19Updated last year
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Updated last year
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆286Updated last year
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Updated 4 years ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Updated 4 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆54Updated 6 months ago