Official repository for AAAI'23 paper: Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinforcement Learning
☆30Nov 26, 2022Updated 3 years ago
Alternatives and similar repositories for G2A2C
Users that are interested in G2A2C are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆44Sep 18, 2021Updated 4 years ago
- ☆38Oct 16, 2023Updated 2 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- Adaptive evaluation reveals that most examined adversarial defenses for GNNs show no or only marginal improvement in robustness. (NeurIPS…☆29Nov 17, 2022Updated 3 years ago
- Codebase used to generate the results for NeurIPS23 "Adversarial Training for Graph Neural Networks: Pitfalls, Solutions, and New Directi…☆13Dec 8, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Sep 16, 2024Updated last year
- Source code of NeurIPS 2022 paper “Co-Modality Graph Contrastive Learning for Imbalanced Node Classification”☆21Jan 15, 2023Updated 3 years ago
- The source code for Adaptive Kernel Graph Neural Network at AAAI2022☆14Feb 23, 2022Updated 4 years ago
- [ICML 25] "Preference Optimization for Combinatorial Optimization Problems"☆26Jun 6, 2025Updated 9 months ago
- Deep Reinforcement Learning framework that uses GNN to solve planning tasks for infrastructural assets☆17Jan 15, 2022Updated 4 years ago
- Open Source Reinforcement Learning Framework for Routing and Spectrum Assignment☆10Mar 18, 2021Updated 5 years ago
- The official source code for Similarity Preserving Adversarial Graph Contrastive Learning (SP-AGCL) at KDD 2023.☆23Jan 18, 2024Updated 2 years ago
- ☆57Oct 5, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for SemEval-16 Task6 subtaskA and subtaskB.☆10Mar 31, 2016Updated 9 years ago
- [TKDE 2024] Robust Knowledge Adaptation for Dynamic Graph Neural Networks☆11Apr 11, 2024Updated last year
- Dynamic Partial Removal: a Neural Network Heuristic for Large Neighborhood Search on Combinatorial Optimization Problems, by applying dee…☆20Jun 17, 2020Updated 5 years ago
- ☆27Feb 28, 2023Updated 3 years ago
- reinforcement learning for voltage control☆11Apr 2, 2019Updated 6 years ago
- Long Short-Term Memory Recurrent Neural Network for Traffic Prediction in Cellular Networks☆12Sep 28, 2020Updated 5 years ago
- source code of KDD 2022 paper "Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN".☆28May 29, 2024Updated last year
- Codes for Dual Stealthy Backdoor☆14Feb 10, 2024Updated 2 years ago
- IronMan+alpha: Graph Neural Network and Reinforcement Learning in High-Level Synthesis☆27Jun 24, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ICML 2022, Finding Global Homophily in Graph Neural Networks When Meeting Heterophily☆46Jul 25, 2022Updated 3 years ago
- Unveiling the Threat of Fraud Gangs to Graph Neural Networks: Multi-Target Graph Injection Attacks against GNN-Based Fraud Detectors (AAA…☆17Oct 24, 2025Updated 5 months ago
- The official implementation of CVPR 2025 paper "Invisible Backdoor Attack against Self-supervised Learning"☆17Jul 5, 2025Updated 8 months ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆862Dec 15, 2023Updated 2 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆392Feb 22, 2024Updated 2 years ago
- Paper Reading list for Shilling Attack and Defense on Recommender Systems☆23Feb 26, 2025Updated last year
- Graph Transformers for Large Graphs☆22Apr 26, 2024Updated last year
- [TMLR] Unsupervised Network Embedding Beyond Homophily (https://arxiv.org/abs/2203.10866) Resources☆11Mar 21, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆28Sep 28, 2021Updated 4 years ago
- Pytorch implementation of EvenNet.☆20Oct 25, 2022Updated 3 years ago
- ☆11Nov 8, 2023Updated 2 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,080Jun 26, 2025Updated 9 months ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- Official repository for NeurIPS'23 paper: GraphPatcher: Mitigating Degree Bias for Graph Neural Networks via Test-time Augmentation☆17Oct 1, 2023Updated 2 years ago
- Source code of NeurIPS 2021 paper “Meta Knowledge on Heterogeneous Graph for Illicit Drug Trafficker Detection on Social Media”☆13Mar 15, 2022Updated 4 years ago