TrustworthyGNN / MIA-GNN
Membership Inference Attack against Graph Neural Networks
☆12Updated 2 years ago
Alternatives and similar repositories for MIA-GNN
Users that are interested in MIA-GNN are comparing it to the libraries listed below
Sorting:
- ☆32Updated 3 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Updated 2 years ago
- ☆28Updated 2 years ago
- ☆55Updated 2 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆47Updated 2 years ago
- Code for ML Doctor☆87Updated 9 months ago
- Official implementation of "GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models" (CCS 2020)☆47Updated 3 years ago
- ☆25Updated 3 years ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆61Updated 7 months ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆60Updated 6 years ago
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆57Updated last year
- ☆11Updated 7 months ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆46Updated last year
- ☆69Updated 2 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆65Updated 3 years ago
- ☆16Updated 3 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆84Updated 3 years ago
- Implementations of differentially private release mechanisms for graph statistics☆23Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated last year
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆14Updated last year
- ☆45Updated 5 years ago
- verifying machine unlearning by backdooring☆20Updated 2 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆23Updated 2 years ago
- The code for our Updates-Leak paper☆16Updated 4 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆74Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Updated 3 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated last year
- ☆14Updated 4 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆38Updated 3 years ago