Code for Towards More Practical Adversarial Attacks on Graph Neural Networks (NeurIPS 2020)
☆27Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for GNN-Practical-Attack
Users that are interested in GNN-Practical-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the official implementation of the paper "Robustness of Graph Neural Networks at Scale" (NeurIPS, 2021).☆31Jul 25, 2023Updated 2 years ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago
- Adaptive evaluation reveals that most examined adversarial defenses for GNNs show no or only marginal improvement in robustness. (NeurIPS…☆29Nov 17, 2022Updated 3 years ago
- Defending graph neural networks against adversarial attacks (NeurIPS 2020)☆72Jul 6, 2023Updated 2 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Pytorch implementation of gnn meta attack (mettack). Paper title: Adversarial Attacks on Graph Neural Networks via Meta Learning.☆21Mar 23, 2021Updated 5 years ago
- A collection of graph data used for semi-supervised node classification.☆41Sep 11, 2022Updated 3 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆44Sep 18, 2021Updated 4 years ago
- Code for "Distributed, Egocentric Representations of Graphs for Detecting Critical Structures" (ICML 2019)☆20Aug 24, 2021Updated 4 years ago
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution☆19Sep 29, 2020Updated 5 years ago
- Adversarial training for Graph Neural Networks☆61Feb 26, 2021Updated 5 years ago
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆59Dec 23, 2019Updated 6 years ago
- Contrastive UCB: Provably Efficient Contrastive Self-Supervised Learning in Online Reinforcement Learning☆11Jun 16, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Implementation of the paper "Adversarial Attacks on Graph Neural Networks via Meta Learning".☆156Dec 9, 2021Updated 4 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆393Feb 22, 2024Updated 2 years ago
- A curated collection of adversarial attack and defense on graph data.☆585Nov 7, 2023Updated 2 years ago
- Course project. A implementation of Graph Wavelet Neural Network (ICLR 2019)☆11Jan 6, 2020Updated 6 years ago
- This is a sample implementation of "Robust Graph Convolutional Networks Against Adversarial Attacks", KDD 2019.☆10Dec 8, 2020Updated 5 years ago
- Open-source datasets for paper "Fairness in Graph Mining: A Survey".☆19Nov 3, 2022Updated 3 years ago
- ☆31Feb 10, 2022Updated 4 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- Source Code for Paper "DAGAD: Data Augmentation for Graph Anomaly Detection" ICDM 2022☆22Mar 14, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Implement of DiGCN, NeurIPS-2020☆46May 20, 2021Updated 4 years ago
- ☆10Mar 13, 2023Updated 3 years ago
- python-segment是一个纯python实现的分词库,他的目标是提供一个可用的,完善的分词系统和训练环境,包括一个可用的词典。☆16May 23, 2013Updated 12 years ago
- ☆19Apr 27, 2022Updated 4 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆225May 31, 2022Updated 3 years ago
- Spring Boot、Spring Security、Vue整合JWT认证的小案例☆10Dec 8, 2022Updated 3 years ago
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- The repository of "Addressing Shortcomings in Fair Graph Learning Datasets: Towards a New Benchmark" (KDD'24)☆13Jan 27, 2026Updated 3 months ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Oct 29, 2020Updated 5 years ago
- ProxyExplainer for Graph Neural Networks☆15Oct 24, 2024Updated last year
- Paper List for Fair Graph Learning (FairGL).☆143Sep 18, 2024Updated last year
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆863Dec 15, 2023Updated 2 years ago
- [TMLR] Unsupervised Network Embedding Beyond Homophily (https://arxiv.org/abs/2203.10866) Resources☆11Mar 21, 2023Updated 3 years ago
- Code used in Tiukhova et al. (2022). Influencer Detection with Dynamic Graph Neural Networks. TGL@Neurips 2022.☆11Feb 9, 2023Updated 3 years ago
- The code of paper "Block Modeling-Guided Graph Convolutional Neural Networks".☆34Dec 21, 2021Updated 4 years ago