☆14Apr 11, 2021Updated 4 years ago
Alternatives and similar repositories for link_stealing_attack
Users that are interested in link_stealing_attack are comparing it to the libraries listed below
Sorting:
- ☆32Feb 10, 2022Updated 4 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆20Oct 8, 2024Updated last year
- ☆10Jan 18, 2022Updated 4 years ago
- ☆29May 8, 2023Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Jul 3, 2023Updated 2 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆50Jul 2, 2025Updated 8 months ago
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Sep 7, 2018Updated 7 years ago
- Code for ML Doctor☆92Aug 14, 2024Updated last year
- ☆12Sep 26, 2024Updated last year
- An unofficial pyotrch implementation of "ML-Leaks:Model and Data Independent Membership Inference Attacks and Defenses on ML Models"☆11Dec 23, 2023Updated 2 years ago
- A NoSQL Document based DB implementation on top of the Ethereum Project blockchain☆11Oct 27, 2017Updated 8 years ago
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- FedGraphNN: A Federated Learning Platform for Graph Neural Networks with MLOps Support. The previous research version is accepted to ICLR…☆183Dec 19, 2023Updated 2 years ago
- ☆14Dec 13, 2021Updated 4 years ago
- academic pages for c2 group☆11Apr 11, 2023Updated 2 years ago
- Offical Code for "PEVAE: A Hierarchical VAE for Personalized Explainable Recommendation."☆12Oct 12, 2022Updated 3 years ago
- Pytorch implementation of XGNN☆10Jan 20, 2021Updated 5 years ago
- ☆13Dec 12, 2024Updated last year
- Dynamic benchmark code for Phys. Rev. E 92, 012805☆10Sep 4, 2015Updated 10 years ago
- ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs☆13Jun 19, 2015Updated 10 years ago
- Code for ICDM2020 full paper: "Sub-graph Contrast for Scalable Self-Supervised Graph Representation Learning"☆46Feb 4, 2022Updated 4 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- The Implemention of "Adversarial Attack on Community Detection by Hiding Individuals"☆13Oct 13, 2020Updated 5 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Code for NAACL-19 paper "Relation Extraction with Temporal Reasoning Based on Memory Augmented Distant Supervision"☆10Aug 26, 2019Updated 6 years ago
- A TEE programming framework based on trusted functions.☆14Mar 23, 2021Updated 4 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- Powerful LaTeX snippets for CS paper writing☆15Feb 25, 2026Updated last week
- ☆14Dec 8, 2022Updated 3 years ago
- Theano implementation of T1-T2 gradient-based method for tuning continuous hyperparameters.☆10Jun 20, 2016Updated 9 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- ☆13Mar 25, 2022Updated 3 years ago
- DataBright: Towards a Global Exchange for Decentralized Data Ownership and Trusted Computation☆13Jun 28, 2018Updated 7 years ago
- 推荐系统BPRMF模型的Pytorch实现,基于MovieLens数据集☆11May 16, 2021Updated 4 years ago
- ☆16May 27, 2021Updated 4 years ago
- Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020☆17Nov 11, 2021Updated 4 years ago
- Zero-shot Learning by Generating Task-specific Adapters☆14Apr 2, 2021Updated 4 years ago