Zhangzhk0819 / GNN-Embedding-Leaks
☆27Updated last year
Related projects ⓘ
Alternatives and complementary repositories for GNN-Embedding-Leaks
- ☆14Updated 3 years ago
- ☆52Updated 2 years ago
- ☆31Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆21Updated 3 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆19Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆46Updated 2 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- ☆17Updated 3 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆33Updated last year
- ☆10Updated 3 months ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆34Updated 3 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆26Updated last year
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated 9 months ago
- verifying machine unlearning by backdooring☆18Updated last year
- Code for ML Doctor☆86Updated 3 months ago
- ☆29Updated last year
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆44Updated last year
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆40Updated last year
- ☆22Updated last year
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆52Updated 11 months ago
- ☆65Updated 2 years ago
- ☆53Updated last year
- ☆36Updated last year
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆32Updated last month
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆14Updated 3 years ago
- ☆38Updated 3 years ago
- ☆62Updated 4 years ago
- ☆19Updated last year