Alert button
Picture for Guohan Huang

Guohan Huang

Alert button

Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs

Add code
Bookmark button
Alert button
Oct 25, 2022
Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang

Figure 1 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Figure 2 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Figure 3 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Figure 4 for Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Viaarxiv icon

Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection

Add code
Bookmark button
Alert button
Aug 14, 2022
Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen

Figure 1 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Figure 2 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Figure 3 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Figure 4 for Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Viaarxiv icon

Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning

Add code
Bookmark button
Alert button
Oct 13, 2021
Jinyin Chen, Guohan Huang, Shanqing Yu, Wenrong Jiang, Chen Cui

Figure 1 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Figure 2 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Figure 3 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Figure 4 for Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning
Viaarxiv icon

Graphfool: Targeted Label Adversarial Attack on Graph Embedding

Add code
Bookmark button
Alert button
Feb 24, 2021
Jinyin Chen, Xiang Lin, Dunjie Zhang, Wenrong Jiang, Guohan Huang, Hui Xiong, Yun Xiang

Figure 1 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Figure 2 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Figure 3 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Figure 4 for Graphfool: Targeted Label Adversarial Attack on Graph Embedding
Viaarxiv icon