☆29May 8, 2023Updated 2 years ago
Alternatives and similar repositories for GNN-Embedding-Leaks
Users that are interested in GNN-Embedding-Leaks are comparing it to the libraries listed below
Sorting:
- ☆14Apr 11, 2021Updated 4 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆12Sep 26, 2024Updated last year
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- ☆14May 8, 2024Updated last year
- ☆14Dec 8, 2022Updated 3 years ago
- Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020☆17Nov 11, 2021Updated 4 years ago
- ☆20Jun 14, 2024Updated last year
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 2 years ago
- General Strategy for Unlearning in Graph Neural Networks☆47Feb 20, 2023Updated 3 years ago
- Modular framework for property inference attacks on deep neural networks☆18Jun 8, 2023Updated 2 years ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆18Apr 25, 2025Updated 10 months ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆20Oct 8, 2024Updated last year
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆53Jul 24, 2025Updated 7 months ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- Data Valuation without Training of a Model, submitted to ICLR'23☆22Dec 30, 2022Updated 3 years ago
- ☆57Oct 5, 2022Updated 3 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- ☆370Jan 4, 2026Updated 2 months ago
- ☆25Nov 14, 2022Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Feb 13, 2024Updated 2 years ago
- ☆35Oct 4, 2021Updated 4 years ago
- [ICML 2021] Information Obfuscation of Graph Neural Networks☆37Jul 15, 2021Updated 4 years ago
- ☆33Aug 24, 2023Updated 2 years ago
- ☆12Jul 25, 2018Updated 7 years ago
- ☆10Feb 27, 2026Updated last week
- ☆32Sep 2, 2024Updated last year
- ☆38Feb 7, 2024Updated 2 years ago
- ☆10Jun 18, 2024Updated last year
- ☆14May 17, 2024Updated last year
- Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches☆12Mar 18, 2024Updated last year
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Feb 17, 2023Updated 3 years ago
- Official implementation for “HarmonyGuard: Toward Safety and Utility in Web Agents via Adaptive Policy Enhancement and Dual-Objective Opt…☆25Jan 10, 2026Updated last month
- ☆11Nov 8, 2023Updated 2 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Causal Reasoning for Membership Inference Attacks☆11Oct 21, 2022Updated 3 years ago