Zhangzhk0819 / GNN-Embedding-LeaksView external linksLinks
☆29May 8, 2023Updated 2 years ago
Alternatives and similar repositories for GNN-Embedding-Leaks
Users that are interested in GNN-Embedding-Leaks are comparing it to the libraries listed below
Sorting:
- ☆14Apr 11, 2021Updated 4 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- ☆12Sep 26, 2024Updated last year
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- ☆14May 8, 2024Updated last year
- Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020☆17Nov 11, 2021Updated 4 years ago
- Adversarial Robustness in Graph Neural Networks: A Hamiltonian Energy Conservation Approach☆16Apr 27, 2024Updated last year
- ☆20Jun 14, 2024Updated last year
- ☆32Feb 10, 2022Updated 4 years ago
- Modular framework for property inference attacks on deep neural networks☆18Jun 8, 2023Updated 2 years ago
- General Strategy for Unlearning in Graph Neural Networks☆47Feb 20, 2023Updated 2 years ago
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 2 years ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆29Sep 25, 2024Updated last year
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆17Apr 25, 2025Updated 9 months ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆53Jul 24, 2025Updated 6 months ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- Data Valuation without Training of a Model, submitted to ICLR'23☆22Dec 30, 2022Updated 3 years ago
- ☆57Oct 5, 2022Updated 3 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- ☆371Jan 4, 2026Updated last month
- ☆25Nov 14, 2022Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Feb 13, 2024Updated 2 years ago
- ☆35Oct 4, 2021Updated 4 years ago
- [ICML 2021] Information Obfuscation of Graph Neural Networks☆37Jul 15, 2021Updated 4 years ago
- Source code for the Information Sciences paper "Rumor Detection on Social Media through Mining the Social Circles with High Homogeneity"☆20Jun 10, 2023Updated 2 years ago
- ☆33Aug 24, 2023Updated 2 years ago
- ☆12Jul 25, 2018Updated 7 years ago
- ☆37Feb 7, 2024Updated 2 years ago
- ☆32Sep 2, 2024Updated last year
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Feb 17, 2023Updated 3 years ago
- ☆39Oct 19, 2025Updated 3 months ago
- ☆14May 17, 2024Updated last year
- Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches☆12Mar 18, 2024Updated last year
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 4 months ago
- Implementation and results for ICTIR2021 paper: Effective and Privacy-preserving Federated Online Learning to Rank☆10Jul 24, 2021Updated 4 years ago
- ☆11May 24, 2022Updated 3 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year