☆29May 8, 2023Updated 2 years ago
Alternatives and similar repositories for GNN-Embedding-Leaks
Users that are interested in GNN-Embedding-Leaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 11, 2021Updated 4 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- ☆12Sep 26, 2024Updated last year
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆21Jun 14, 2024Updated last year
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- Modular framework for property inference attacks on deep neural networks☆18Jun 8, 2023Updated 2 years ago
- General Strategy for Unlearning in Graph Neural Networks☆47Feb 20, 2023Updated 3 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- walk2friends: Inferring Social Links from Mobility Profiles☆22Mar 26, 2018Updated 8 years ago
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆18Apr 25, 2025Updated 11 months ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- ☆371Jan 4, 2026Updated 2 months ago
- [ICML 2021] Information Obfuscation of Graph Neural Networks☆37Jul 15, 2021Updated 4 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- The Implemention of "Adversarial Attack on Community Detection by Hiding Individuals"☆13Oct 13, 2020Updated 5 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago
- ☆57Oct 5, 2022Updated 3 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆54Jul 24, 2025Updated 8 months ago
- ☆24Dec 15, 2018Updated 7 years ago
- ☆10Jan 7, 2026Updated 2 months ago
- ☆33Aug 24, 2023Updated 2 years ago
- ☆10Dec 30, 2021Updated 4 years ago
- ☆54Mar 16, 2021Updated 5 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Feb 13, 2024Updated 2 years ago
- An unofficial pyotrch implementation of "ML-Leaks:Model and Data Independent Membership Inference Attacks and Defenses on ML Models"☆11Dec 23, 2023Updated 2 years ago
- ☆16Jan 26, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- ☆11Nov 8, 2023Updated 2 years ago
- This repository is the implementation of Federated Graph Classification over Non-IID Graphs.☆45Jun 8, 2023Updated 2 years ago
- ☆35Oct 4, 2021Updated 4 years ago
- Code for co-training large language models (e.g. T0) with smaller ones (e.g. BERT) to boost few-shot performance☆17Sep 23, 2022Updated 3 years ago
- ☆16Jun 22, 2023Updated 2 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Jul 3, 2023Updated 2 years ago