An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)
☆61Dec 3, 2023Updated 2 years ago
Alternatives and similar repositories for UGBA
Users that are interested in UGBA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57Oct 5, 2022Updated 3 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆44Sep 18, 2021Updated 4 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆24May 3, 2023Updated 2 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Sep 16, 2024Updated last year
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆33Aug 24, 2023Updated 2 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- ☆18Jun 10, 2024Updated last year
- source code of KDD 2022 paper "Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN".☆28May 29, 2024Updated last year
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- A graph reliability toolbox based on PyTorch and PyTorch Geometric (PyG).☆89Oct 15, 2024Updated last year
- ☆15Apr 7, 2023Updated 3 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,080Jun 26, 2025Updated 9 months ago
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Nov 13, 2022Updated 3 years ago
- A curated list of adversarial attacks and defenses papers on graph-structured data.☆864Dec 15, 2023Updated 2 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- The implementation of paper "Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks"☆13Jun 17, 2021Updated 4 years ago
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago
- [WWW 2023] "Addressing Heterophily in Graph Anomaly Detection: A Perspective of Graph Spectrum" by Yuan Gao, Xiang Wang, Xiangnan He, Zhe…☆39Oct 17, 2023Updated 2 years ago
- ☆25Jun 27, 2022Updated 3 years ago
- The code impliments for paper "MHNF: Multi-hop Heterogeneous Neighborhood information Fusion graph representation learning.”☆11Oct 29, 2023Updated 2 years ago
- The official implementation for ICLR23 paper "GNNSafe: Energy-based Out-of-Distribution Detection for Graph Neural Networks"☆84Jul 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Multi-metrics adaptively identifies backdoors in Federated learning☆39Aug 7, 2025Updated 8 months ago
- GraphFramEx: a systematic evaluation framework for explainability methods on GNNs☆50Apr 8, 2024Updated 2 years ago
- Offical pytorch implementation of proposed NRGNN and Compared Methods in "NRGNN: Learning a Label Noise-Resistant Graph Neural Network on…☆46Jul 5, 2022Updated 3 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆60Dec 11, 2024Updated last year
- ☆18Oct 22, 2020Updated 5 years ago
- A curated collection of adversarial attack and defense on graph data.☆584Nov 7, 2023Updated 2 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆225May 31, 2022Updated 3 years ago
- The multiplex network of human diseases☆15Jul 3, 2025Updated 9 months ago
- G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)☆30Jan 11, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆24Aug 9, 2022Updated 3 years ago
- [CIKM 2023] Code for the paper "LTE4G: Long-Tail Experts for Graph Neural Networks"☆40Sep 8, 2022Updated 3 years ago
- ☆31Oct 10, 2023Updated 2 years ago
- Official implementation of our paper "Separate the Wheat from the Chaff: Model Deficiency Unlearning via Parameter-Efficient Module Opera…☆11Sep 20, 2024Updated last year
- Graph Robustness Benchmark: A scalable, unified, modular, and reproducible benchmark for evaluating the adversarial robustness of Graph M…☆99Nov 6, 2023Updated 2 years ago
- An SSG tool for quickly building modern documentation sites. 🚀️🚀️🚀️☆27Mar 9, 2024Updated 2 years ago
- ☆21Mar 14, 2025Updated last year