Zhangzhk0819 / GNN-Embedding-Leaks
☆26Updated last year
Related projects ⓘ
Alternatives and complementary repositories for GNN-Embedding-Leaks
- ☆14Updated 3 years ago
- ☆52Updated 2 years ago
- ☆31Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆21Updated 3 years ago
- ☆9Updated 2 months ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆33Updated 3 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆18Updated last year
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆52Updated 11 months ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆46Updated 2 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated 8 months ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆38Updated last year
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆32Updated last year
- ☆17Updated 3 years ago
- ☆29Updated last year
- Code for ML Doctor☆86Updated 2 months ago
- ☆64Updated 2 years ago
- SaTML'23 paper "Backdoor Attacks on Time Series: A Generative Approach" by Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, and James Bail…☆17Updated last year
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆22Updated last year
- ☆22Updated last year
- ☆23Updated 3 years ago
- verifying machine unlearning by backdooring☆18Updated last year
- ☆12Updated last year
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆44Updated last year
- This is a python script to generate nice bibtex file for latex.☆16Updated 4 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆26Updated last year
- Anti-Backdoor learning (NeurIPS 2021)☆78Updated last year
- ☆12Updated 6 months ago