☆30May 8, 2023Updated 3 years ago
Alternatives and similar repositories for GNN-Embedding-Leaks
Users that are interested in GNN-Embedding-Leaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 11, 2021Updated 5 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- ☆13Sep 26, 2024Updated last year
- ☆14Dec 8, 2022Updated 3 years ago
- ☆23Jun 14, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- ☆14May 8, 2024Updated 2 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020☆18Nov 11, 2021Updated 4 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- Modular framework for property inference attacks on deep neural networks☆18Jun 8, 2023Updated 2 years ago
- General Strategy for Unlearning in Graph Neural Networks☆47Feb 20, 2023Updated 3 years ago
- ☆31Feb 10, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Adversarial Robustness in Graph Neural Networks: A Hamiltonian Energy Conservation Approach☆16Apr 27, 2024Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- walk2friends: Inferring Social Links from Mobility Profiles☆21Mar 26, 2018Updated 8 years ago
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 3 years ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆19Apr 25, 2025Updated last year
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- ☆372Apr 8, 2026Updated last month
- [ICML 2021] Information Obfuscation of Graph Neural Networks☆37Jul 15, 2021Updated 4 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Implemention of "Adversarial Attack on Community Detection by Hiding Individuals"☆13Oct 13, 2020Updated 5 years ago
- ☆57Oct 5, 2022Updated 3 years ago
- ☆18Jul 20, 2023Updated 2 years ago
- ☆13Apr 3, 2024Updated 2 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆54Jul 24, 2025Updated 9 months ago
- ☆24Dec 15, 2018Updated 7 years ago
- ☆11May 24, 2022Updated 3 years ago
- ☆10Jan 7, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆32Aug 24, 2023Updated 2 years ago
- ☆10Dec 30, 2021Updated 4 years ago
- A PyTorch implementation of MPC as a Function Approximator☆19Sep 27, 2021Updated 4 years ago
- ☆56Mar 16, 2021Updated 5 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Feb 13, 2024Updated 2 years ago
- Simple implementation for Constrained Policy Optimization in Pytorch☆17Aug 27, 2022Updated 3 years ago
- Data Valuation without Training of a Model, submitted to ICLR'23☆22Dec 30, 2022Updated 3 years ago