Picture for Xiangwen Yang

Xiangwen Yang

Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks

Add code
May 23, 2024
Figure 1 for Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks
Figure 2 for Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks
Figure 3 for Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks
Figure 4 for Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks
Viaarxiv icon

GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks

Add code
Dec 13, 2023
Viaarxiv icon

Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications

Add code
Oct 17, 2021
Figure 1 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Figure 2 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Figure 3 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Figure 4 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Viaarxiv icon

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Add code
Oct 24, 2020
Figure 1 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Figure 2 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Figure 3 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Figure 4 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Viaarxiv icon

Defending Against Misclassification Attacks in Transfer Learning

Add code
Sep 12, 2019
Figure 1 for Defending Against Misclassification Attacks in Transfer Learning
Figure 2 for Defending Against Misclassification Attacks in Transfer Learning
Figure 3 for Defending Against Misclassification Attacks in Transfer Learning
Figure 4 for Defending Against Misclassification Attacks in Transfer Learning
Viaarxiv icon