xinleihe / GNNStealing
☆32Updated 3 years ago
Alternatives and similar repositories for GNNStealing:
Users that are interested in GNNStealing are comparing it to the libraries listed below
- ☆28Updated last year
- ☆53Updated 2 years ago
- ☆14Updated 3 years ago
- Code for ML Doctor☆88Updated 7 months ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Updated 3 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆46Updated 2 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆37Updated 3 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆47Updated last year
- Code related to the paper "Machine Unlearning of Features and Labels"☆69Updated last year
- ☆64Updated 4 years ago
- ☆23Updated 2 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆45Updated 2 years ago
- This is a python script to generate nice bibtex file for latex.☆16Updated 5 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆57Updated last year
- Implementations of differentially private release mechanisms for graph statistics☆23Updated 2 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- ☆69Updated 2 years ago
- ☆45Updated 5 years ago
- ☆16Updated 3 years ago
- ☆25Updated 3 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 2 years ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆58Updated 5 months ago
- ☆10Updated 3 years ago
- ☆19Updated 2 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆23Updated last year
- ☆24Updated 2 years ago
- ☆31Updated 7 months ago