An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)
☆61Dec 3, 2023Updated 2 years ago
Alternatives and similar repositories for UGBA
Users that are interested in UGBA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57Oct 5, 2022Updated 3 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆44Sep 18, 2021Updated 4 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆24May 3, 2023Updated 3 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Sep 16, 2024Updated last year
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆32Aug 24, 2023Updated 2 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- ☆18Jun 10, 2024Updated last year
- ☆35Oct 4, 2021Updated 4 years ago
- An official PyTorch implementation of "Certifiably Robust Graph Contrastive Learning" (NeurIPS 2023)☆11Jan 22, 2024Updated 2 years ago
- source code of KDD 2022 paper "Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN".☆28May 29, 2024Updated last year
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- ☆15Apr 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,081Jun 26, 2025Updated 10 months ago
- This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Nov 9, 2024Updated last year
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- ☆11Nov 13, 2022Updated 3 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆863Dec 15, 2023Updated 2 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- The implementation of paper "Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks"☆13Jun 17, 2021Updated 4 years ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [WWW 2023] "Addressing Heterophily in Graph Anomaly Detection: A Perspective of Graph Spectrum" by Yuan Gao, Xiang Wang, Xiangnan He, Zhe …☆39Oct 17, 2023Updated 2 years ago
- ☆25Jun 27, 2022Updated 3 years ago
- The code impliments for paper "MHNF: Multi-hop Heterogeneous Neighborhood information Fusion graph representation learning.”☆11Oct 29, 2023Updated 2 years ago
- The official implementation for ICLR23 paper "GNNSafe: Energy-based Out-of-Distribution Detection for Graph Neural Networks"☆84Jul 27, 2023Updated 2 years ago
- Multi-metrics adaptively identifies backdoors in Federated learning☆37Aug 7, 2025Updated 8 months ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆27Jul 22, 2023Updated 2 years ago
- GraphFramEx: a systematic evaluation framework for explainability methods on GNNs☆50Apr 8, 2024Updated 2 years ago
- Offical pytorch implementation of proposed NRGNN and Compared Methods in "NRGNN: Learning a Label Noise-Resistant Graph Neural Network on…☆46Jul 5, 2022Updated 3 years ago
- Example code for the NNGeometry PyTorch library☆10Aug 20, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆59Dec 11, 2024Updated last year
- ☆18Oct 22, 2020Updated 5 years ago
- A curated collection of adversarial attack and defense on graph data.☆585Nov 7, 2023Updated 2 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆225May 31, 2022Updated 3 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- [CIKM 2023] Code for the paper "LTE4G: Long-Tail Experts for Graph Neural Networks"☆41Sep 8, 2022Updated 3 years ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆30Jan 11, 2022Updated 4 years ago