Zhangzhk0819 / GNN-Embedding-Leaks
☆27Updated last year
Alternatives and similar repositories for GNN-Embedding-Leaks:
Users that are interested in GNN-Embedding-Leaks are comparing it to the libraries listed below
- ☆14Updated 3 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆22Updated 3 years ago
- ☆31Updated 2 years ago
- ☆53Updated 2 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆36Updated 3 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆21Updated last year
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆56Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆47Updated 2 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆17Updated 3 months ago
- verifying machine unlearning by backdooring☆19Updated last year
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆42Updated last year
- Code for ML Doctor☆85Updated 5 months ago
- Implementations of differentially private release mechanisms for graph statistics☆20Updated 2 years ago
- ☆67Updated 2 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆22Updated last year
- ☆16Updated 5 months ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆45Updated last year
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated 11 months ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆58Updated 3 months ago
- ☆15Updated 3 years ago
- ☆24Updated 3 years ago
- ☆24Updated last year
- ☆31Updated last year
- ☆10Updated 4 years ago
- SaTML'23 paper "Backdoor Attacks on Time Series: A Generative Approach" by Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, and James Bail…☆17Updated last year
- ☆10Updated 3 years ago
- ☆64Updated 4 years ago
- ☆18Updated 4 years ago