xinleihe / GNNStealingLinks
☆32Updated 3 years ago
Alternatives and similar repositories for GNNStealing
Users that are interested in GNNStealing are comparing it to the libraries listed below
Sorting:
- ☆28Updated 2 years ago
- ☆57Updated 2 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆49Updated 2 months ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Updated 4 years ago
- Code for ML Doctor☆90Updated last year
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆48Updated 3 years ago
- ☆11Updated 11 months ago
- ☆14Updated 4 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆65Updated 4 years ago
- Implementations of differentially private release mechanisms for graph statistics☆24Updated 3 years ago
- Membership Inference Attack against Graph Neural Networks☆12Updated 2 years ago
- ☆21Updated 3 years ago
- Python package to create adversarial agents for membership inference attacks againts machine learning models☆47Updated 6 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Updated 2 years ago
- ☆70Updated 3 years ago
- Privacy attacks on Split Learning☆42Updated 3 years ago
- Improved DP-SGD for optimizing☆18Updated 6 years ago
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆40Updated 4 years ago
- ☆66Updated 4 years ago
- verifying machine unlearning by backdooring☆20Updated 2 years ago
- This repo implements several algorithms for learning with differential privacy.☆109Updated 2 years ago
- This is a python script to generate nice bibtex file for latex.☆17Updated 5 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆17Updated 3 years ago
- ☆45Updated 5 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆27Updated 3 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆32Updated last year
- ☆49Updated 4 years ago
- ☆11Updated 4 years ago