Alert button
Picture for Minhua Lin

Minhua Lin

Alert button

PreGIP: Watermarking the Pretraining of Graph Neural Networks for Deep Intellectual Property Protection

Add code
Bookmark button
Alert button
Feb 06, 2024
Enyan Dai, Minhua Lin, Suhang Wang

Viaarxiv icon

Certifiably Robust Graph Contrastive Learning

Add code
Bookmark button
Alert button
Oct 05, 2023
Minhua Lin, Teng Xiao, Enyan Dai, Xiang Zhang, Suhang Wang

Figure 1 for Certifiably Robust Graph Contrastive Learning
Figure 2 for Certifiably Robust Graph Contrastive Learning
Figure 3 for Certifiably Robust Graph Contrastive Learning
Figure 4 for Certifiably Robust Graph Contrastive Learning
Viaarxiv icon

Unnoticeable Backdoor Attacks on Graph Neural Networks

Add code
Bookmark button
Alert button
Feb 11, 2023
Enyan Dai, Minhua Lin, Xiang Zhang, Suhang Wang

Figure 1 for Unnoticeable Backdoor Attacks on Graph Neural Networks
Figure 2 for Unnoticeable Backdoor Attacks on Graph Neural Networks
Figure 3 for Unnoticeable Backdoor Attacks on Graph Neural Networks
Figure 4 for Unnoticeable Backdoor Attacks on Graph Neural Networks
Viaarxiv icon

Evasion Attacks to Graph Neural Networks via Influence Function

Add code
Bookmark button
Alert button
Sep 12, 2020
Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, Yiran Chen

Figure 1 for Evasion Attacks to Graph Neural Networks via Influence Function
Figure 2 for Evasion Attacks to Graph Neural Networks via Influence Function
Figure 3 for Evasion Attacks to Graph Neural Networks via Influence Function
Figure 4 for Evasion Attacks to Graph Neural Networks via Influence Function
Viaarxiv icon

Efficient Evasion Attacks to Graph Neural Networks via Influence Function

Add code
Bookmark button
Alert button
Sep 01, 2020
Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, Yiran Chen

Figure 1 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Figure 2 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Figure 3 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Figure 4 for Efficient Evasion Attacks to Graph Neural Networks via Influence Function
Viaarxiv icon