haonan3 / Secure-Network-Release-with-Link-PrivacyView external linksLinks
☆10Oct 18, 2021Updated 4 years ago
Alternatives and similar repositories for Secure-Network-Release-with-Link-Privacy
Users that are interested in Secure-Network-Release-with-Link-Privacy are comparing it to the libraries listed below
Sorting:
- Official Pytorch implementation of IJCAI'21 paper "GraphMI: Extracting Private Graph Data from Graph Neural Networks"☆13Nov 19, 2021Updated 4 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆50Jul 3, 2023Updated 2 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆50Jul 2, 2025Updated 7 months ago
- Concentrated Differentially Private Gradient Descent with Adaptive per-iteration Privacy Budget☆49Mar 1, 2018Updated 7 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago
- ☆31Jan 29, 2024Updated 2 years ago
- ☆33Feb 8, 2026Updated last week
- Code for running experiments and benchmarking on GNNExplainer: Generating Explanations for Graph Neural Networks☆15May 8, 2021Updated 4 years ago
- ☆11Jun 22, 2025Updated 7 months ago
- ☆32Feb 10, 2022Updated 4 years ago
- ☆10Nov 30, 2022Updated 3 years ago
- ☆13May 16, 2019Updated 6 years ago
- ☆14May 17, 2024Updated last year
- Quantifying Uncertainty in Deep Spatiotemporal Forecasting☆12Mar 20, 2021Updated 4 years ago
- Implementation and results for ICTIR2021 paper: Effective and Privacy-preserving Federated Online Learning to Rank☆10Jul 24, 2021Updated 4 years ago
- ☆13Sep 12, 2021Updated 4 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 4 months ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- DISCO: Comprehensive and Explainable Disinformation Detection, CIKM 2022☆10May 5, 2023Updated 2 years ago
- ☆12Sep 17, 2019Updated 6 years ago
- ☆14Dec 18, 2024Updated last year
- How to convert MDS trip data to anonymized open data for city governments.☆10Jul 6, 2020Updated 5 years ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- PROVED (PRocess mining OVer uncErtain Data) is a library of functionalities to perform process mining on uncertain event data.☆12Jan 12, 2023Updated 3 years ago
- ☆11Jun 25, 2025Updated 7 months ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- ☆16Dec 11, 2023Updated 2 years ago
- Linear algebra-based Proof of Retrievability protocol for ensuring data integrity☆14Mar 28, 2022Updated 3 years ago
- Research and experimental code related to Opacus, an open-source library for training PyTorch models with Differential Privacy☆18Oct 9, 2024Updated last year
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- ☆11Oct 1, 2018Updated 7 years ago
- ☆14May 25, 2022Updated 3 years ago
- virtual node analysis on ogb benchmark dataset☆14Mar 9, 2023Updated 2 years ago
- an artificial data generator for process discovery evaluation☆12Aug 22, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/provable-data-possession☆14Oct 19, 2015Updated 10 years ago