An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)
☆61Dec 3, 2023Updated 2 years ago
Alternatives and similar repositories for UGBA
Users that are interested in UGBA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57Oct 5, 2022Updated 3 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆44Sep 18, 2021Updated 4 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆24May 3, 2023Updated 2 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Sep 16, 2024Updated last year
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- ☆33Aug 24, 2023Updated 2 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- ☆18Jun 10, 2024Updated last year
- An official PyTorch implementation of "Certifiably Robust Graph Contrastive Learning" (NeurIPS 2023)☆11Jan 22, 2024Updated 2 years ago
- source code of KDD 2022 paper "Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN".☆28May 29, 2024Updated last year
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- ☆15Apr 7, 2023Updated 2 years ago
- This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Nov 9, 2024Updated last year
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- ☆11Nov 13, 2022Updated 3 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆861Dec 15, 2023Updated 2 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- The implementation of paper "Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks"☆13Jun 17, 2021Updated 4 years ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago
- [WWW 2023] "Addressing Heterophily in Graph Anomaly Detection: A Perspective of Graph Spectrum" by Yuan Gao, Xiang Wang, Xiangnan He, Zhe…☆39Oct 17, 2023Updated 2 years ago
- ☆25Jun 27, 2022Updated 3 years ago
- The code impliments for paper "MHNF: Multi-hop Heterogeneous Neighborhood information Fusion graph representation learning.”☆11Oct 29, 2023Updated 2 years ago
- The official implementation for ICLR23 paper "GNNSafe: Energy-based Out-of-Distribution Detection for Graph Neural Networks"☆84Jul 27, 2023Updated 2 years ago
- Multi-metrics adaptively identifies backdoors in Federated learning☆38Aug 7, 2025Updated 7 months ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Jul 22, 2023Updated 2 years ago
- GraphFramEx: a systematic evaluation framework for explainability methods on GNNs☆50Apr 8, 2024Updated last year
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆60Dec 11, 2024Updated last year
- [CIKM 2023] Code for the paper "LTE4G: Long-Tail Experts for Graph Neural Networks"☆40Sep 8, 2022Updated 3 years ago
- The multiplex network of human diseases☆15Jul 3, 2025Updated 8 months ago
- ☆24Aug 9, 2022Updated 3 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆29Jan 11, 2022Updated 4 years ago
- Official implementation of our paper "Separate the Wheat from the Chaff: Model Deficiency Unlearning via Parameter-Efficient Module Opera…☆11Sep 20, 2024Updated last year
- ☆31Oct 10, 2023Updated 2 years ago
- Graph Robustness Benchmark: A scalable, unified, modular, and reproducible benchmark for evaluating the adversarial robustness of Graph M…☆99Nov 6, 2023Updated 2 years ago
- PyTorch pipeline for Kaggle Jigsaw Toxic Comment Classification Challenge☆11Mar 23, 2018Updated 8 years ago
- 电子科技大学信息与软件学院研究生一年级学科课程资料☆11Dec 17, 2021Updated 4 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year