Picture for Xingliang Yuan

Xingliang Yuan

GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks

Add code
Dec 13, 2023
Viaarxiv icon

RAI4IoE: Responsible AI for Enabling the Internet of Energy

Add code
Sep 20, 2023
Figure 1 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Figure 2 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Figure 3 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Figure 4 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Viaarxiv icon

Training-free Lexical Backdoor Attacks on Language Models

Add code
Feb 08, 2023
Figure 1 for Training-free Lexical Backdoor Attacks on Language Models
Figure 2 for Training-free Lexical Backdoor Attacks on Language Models
Figure 3 for Training-free Lexical Backdoor Attacks on Language Models
Figure 4 for Training-free Lexical Backdoor Attacks on Language Models
Viaarxiv icon

On the Interaction between Node Fairness and Edge Privacy in Graph Neural Networks

Add code
Jan 30, 2023
Viaarxiv icon

Trustworthy Graph Neural Networks: Aspects, Methods and Trends

Add code
May 16, 2022
Figure 1 for Trustworthy Graph Neural Networks: Aspects, Methods and Trends
Figure 2 for Trustworthy Graph Neural Networks: Aspects, Methods and Trends
Figure 3 for Trustworthy Graph Neural Networks: Aspects, Methods and Trends
Figure 4 for Trustworthy Graph Neural Networks: Aspects, Methods and Trends
Viaarxiv icon

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining

Add code
Mar 14, 2022
Figure 1 for The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining
Figure 2 for The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining
Figure 3 for The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining
Figure 4 for The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining
Viaarxiv icon

Projective Ranking-based GNN Evasion Attacks

Add code
Feb 25, 2022
Figure 1 for Projective Ranking-based GNN Evasion Attacks
Figure 2 for Projective Ranking-based GNN Evasion Attacks
Figure 3 for Projective Ranking-based GNN Evasion Attacks
Figure 4 for Projective Ranking-based GNN Evasion Attacks
Viaarxiv icon

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization

Add code
Feb 04, 2022
Figure 1 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Figure 2 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Figure 3 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Figure 4 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Viaarxiv icon

Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications

Add code
Oct 17, 2021
Figure 1 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Figure 2 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Figure 3 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Figure 4 for Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Viaarxiv icon

RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System

Add code
Dec 08, 2020
Figure 1 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Figure 2 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Figure 3 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Figure 4 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Viaarxiv icon