☆31Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for GNNStealing
Users that are interested in GNNStealing are comparing it to the libraries listed below
Sorting:
- ☆14Apr 11, 2021Updated 4 years ago
- Code for ML Doctor☆92Aug 14, 2024Updated last year
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- ☆29May 8, 2023Updated 2 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- This repository contains the official implementation of the paper "Robustness of Graph Neural Networks at Scale" (NeurIPS, 2021).☆31Jul 25, 2023Updated 2 years ago
- ☆14May 8, 2024Updated last year
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- The code for our Updates-Leak paper☆17Jul 23, 2020Updated 5 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Jul 3, 2023Updated 2 years ago
- TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations☆20Dec 27, 2020Updated 5 years ago
- Not All Poisons are Created Equal: Robust Training against Data Poisoning (ICML 2022)☆22Aug 8, 2022Updated 3 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 3 years ago
- ☆21Oct 25, 2021Updated 4 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- Code for Towards More Practical Adversarial Attacks on Graph Neural Networks (NeurIPS 2020)☆28Nov 13, 2021Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- FLPoison: Benchmarking Poisoning Attacks and Defenses in Federated Learning☆56Sep 22, 2025Updated 5 months ago
- [ICML 2021] Information Obfuscation of Graph Neural Networks☆37Jul 15, 2021Updated 4 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆76Apr 1, 2024Updated last year
- [CCS 2024] "BadMerging: Backdoor Attacks Against Model Merging": official code implementation.☆35Aug 22, 2024Updated last year
- Repository for Towards Codable Watermarking for Large Language Models☆37Sep 20, 2023Updated 2 years ago
- Cochlear implant signal processing☆10Jun 24, 2021Updated 4 years ago
- ☆44Apr 25, 2023Updated 2 years ago
- ☆32Sep 2, 2024Updated last year
- Collection of Pure Data patches collected from all over the world (mostly not mine)☆11Dec 17, 2020Updated 5 years ago
- ☆10Sep 24, 2019Updated 6 years ago
- ☆10Oct 2, 2024Updated last year
- A synthesizer using React, ToneJS, and nexusUI.☆10Jul 18, 2016Updated 9 years ago
- An awesome list of papers on privacy attacks against machine learning☆633Mar 18, 2024Updated last year
- Deep learning based automatic modulation classification for sub-carriers of OFDM signals.☆12Jan 3, 2024Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- ☆11Nov 10, 2020Updated 5 years ago
- Polynomial semantics of linear logic☆13Apr 15, 2018Updated 7 years ago