☆18Jan 12, 2022Updated 4 years ago
Alternatives and similar repositories for Graph-Universal-Attack
Users that are interested in Graph-Universal-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Implementation of the paper "Adversarial Attacks on Graph Neural Networks via Meta Learning".☆156Dec 9, 2021Updated 4 years ago
- Adversarial training for Graph Neural Networks☆61Feb 26, 2021Updated 5 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆225May 31, 2022Updated 3 years ago
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆59Dec 23, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆863Dec 15, 2023Updated 2 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆393Feb 22, 2024Updated 2 years ago
- Official PyTorch implementation of "Towards Deeper Graph Neural Networks" [KDD2020]☆68Oct 11, 2022Updated 3 years ago
- Using self-play to augment multi-turn text-to-SQL datasets☆11Oct 20, 2022Updated 3 years ago
- ☆14Mar 5, 2026Updated 2 months ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- ☆22Oct 14, 2022Updated 3 years ago
- Conversations with Search Engines☆14Jun 12, 2023Updated 2 years ago
- A batched implementation for efficient Qwen2.5-VL inference.☆25Jul 16, 2025Updated 9 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The implementation of paper "Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks"☆13Jun 17, 2021Updated 4 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,081Jun 26, 2025Updated 10 months ago
- [ICML 2023] FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning☆22Oct 18, 2024Updated last year
- ☆11Mar 24, 2023Updated 3 years ago
- 宝可梦3代GBA汉字字库补丁(增益优化版)☆14Jul 15, 2024Updated last year
- ☆14Apr 11, 2018Updated 8 years ago
- Implementation of paper "Self-supervised Learning on Graphs:Deep Insights and New Directions"☆97Jul 6, 2023Updated 2 years ago
- pytorch implementation of Graph Attention Networks☆16May 29, 2020Updated 5 years ago
- ☆16Mar 25, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- 可用于《宝可梦》第四世代汉化修正版的 PKHeX 版本☆14Jul 19, 2025Updated 9 months ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- Implementation of the certificates proposed in the paper "Efficient Robustness Certificates for Discrete Data: Sparsity-Aware Randomized …☆37Jun 27, 2023Updated 2 years ago
- Official implementation of the ICML2021 paper "Elastic Graph Neural Networks"☆42Jul 25, 2021Updated 4 years ago
- Venus is a state-of-the-art sound and complete verification toolkit for Relu-based feed-forward neural networks. It can be used to check…☆15Aug 31, 2022Updated 3 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- ☆15Feb 26, 2023Updated 3 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Dataset for GAN-Generated Images Detection☆10Apr 25, 2024Updated 2 years ago
- PyTorch implementation of ACL paper https://arxiv.org/abs/1906.02656☆25Jun 12, 2023Updated 2 years ago
- Certifying Geometric Robustness of Neural Networks☆16Mar 24, 2023Updated 3 years ago
- Code and dataset for the paper "IsarStep: a Benchmark for High-level Mathematical Reasoning"☆12Mar 15, 2021Updated 5 years ago
- PokeClassic is a romhack inspired by Pokemon Yellow, using the Pokemon Emerald Engine. This romhack was originally made by danenders. Thi…☆21Updated this week
- ☆20Nov 29, 2021Updated 4 years ago
- The official repository for CosPGD: a unified white-box adversarial attack for pixel-wise prediction tasks.☆15May 8, 2025Updated 11 months ago