Picture for Xuewen Dong

Xuewen Dong

Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks

Add code
Mar 12, 2025
Figure 1 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Figure 2 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Figure 3 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Figure 4 for Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Viaarxiv icon

Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy

Add code
Feb 12, 2025
Figure 1 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Figure 2 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Figure 3 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Figure 4 for Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy
Viaarxiv icon