☆14Apr 11, 2021Updated 4 years ago
Alternatives and similar repositories for link_stealing_attack
Users that are interested in link_stealing_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Dec 30, 2021Updated 4 years ago
- ☆31Feb 10, 2022Updated 4 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- ☆29May 8, 2023Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- ☆10Jan 18, 2022Updated 4 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Jul 3, 2023Updated 2 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆50Jul 2, 2025Updated 8 months ago
- ☆14Dec 13, 2021Updated 4 years ago
- FedGraphNN: A Federated Learning Platform for Graph Neural Networks with MLOps Support. The previous research version is accepted to ICLR…☆184Dec 19, 2023Updated 2 years ago
- ☆18Jul 20, 2023Updated 2 years ago
- Code for ML Doctor☆91Aug 14, 2024Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Sep 7, 2018Updated 7 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- ☆13Jul 12, 2022Updated 3 years ago
- Modular Adversarial Robustness Toolkit☆21Jul 11, 2025Updated 8 months ago
- A TEE programming framework based on trusted functions.☆14Mar 23, 2021Updated 5 years ago
- ☆12Sep 26, 2024Updated last year
- A NoSQL Document based DB implementation on top of the Ethereum Project blockchain☆11Oct 27, 2017Updated 8 years ago
- Simple implementation for Constrained Policy Optimization in Pytorch☆17Aug 27, 2022Updated 3 years ago
- Code for NAACL-19 paper "Relation Extraction with Temporal Reasoning Based on Memory Augmented Distant Supervision"☆10Aug 26, 2019Updated 6 years ago
- The code of paper "Adversarial Label-Flipping Attack and Defense for Graph Neural Networks" (ICDM 2020)☆18Mar 19, 2021Updated 5 years ago
- DataBright: Towards a Global Exchange for Decentralized Data Ownership and Trusted Computation☆13Jun 28, 2018Updated 7 years ago
- ☆14May 8, 2024Updated last year
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Jul 12, 2022Updated 3 years ago
- Code for ICDM2020 full paper: "Sub-graph Contrast for Scalable Self-Supervised Graph Representation Learning"☆46Feb 4, 2022Updated 4 years ago
- ☆13Mar 25, 2022Updated 3 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- Local Discriminative Regions for Scene Recognition (ACMMM 2018)☆22Oct 3, 2023Updated 2 years ago
- ☆27Nov 20, 2023Updated 2 years ago
- Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation, WWW22☆17Jun 30, 2022Updated 3 years ago
- ☆11Apr 2, 2021Updated 4 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Pytorch implementation of XGNN☆10Jan 20, 2021Updated 5 years ago
- Droplet: Decentralized Authorization for IoT Data Streams☆15May 22, 2023Updated 2 years ago
- ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs☆13Jun 19, 2015Updated 10 years ago