xinleihe / link_stealing_attack
☆14Updated 3 years ago
Alternatives and similar repositories for link_stealing_attack:
Users that are interested in link_stealing_attack are comparing it to the libraries listed below
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆22Updated 3 years ago
- ☆27Updated last year
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- ☆31Updated 2 years ago
- ☆53Updated 2 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆45Updated last year
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆22Updated last year
- A PyTorch implementation of "Backdoor Attacks to Graph Neural Networks" (SACMAT'21)☆36Updated 3 years ago
- Implementation of paper "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks"☆21Updated last year
- Implementation of Adversarial Privacy Graph Embedding in TensorFlow☆19Updated 4 years ago
- ☆15Updated 3 years ago
- Implementations of differentially private release mechanisms for graph statistics☆20Updated 2 years ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Updated 3 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆42Updated last year
- ☆24Updated 3 years ago
- Implementation of "PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information"☆12Updated last year
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆17Updated 3 months ago
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆56Updated last year
- ☆11Updated 2 years ago
- ☆10Updated 3 years ago
- Code for CCS '23 paper "Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian Estimation"☆10Updated last year
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆58Updated 3 months ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆47Updated 2 years ago
- PyTorch implementation of a number of mechanisms in local differential privacy☆15Updated 2 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 4 years ago
- ☆18Updated 4 years ago
- ☆10Updated last month
- A list of papers using/about Federated Learning especially malicious client and attacks.☆12Updated 4 years ago
- ☆36Updated 3 years ago
- Concentrated Differentially Private Gradient Descent with Adaptive per-iteration Privacy Budget☆49Updated 6 years ago