Picture for Yulin Zhu

Yulin Zhu

Stealthy Dual-Trigger Backdoors: Attacking Prompt Tuning in LM-Empowered Graph Foundation Models

Add code
Oct 16, 2025
Viaarxiv icon

AuditVotes: A Framework Towards More Deployable Certified Robustness for Graph Neural Networks

Add code
Mar 29, 2025
Viaarxiv icon

SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks

Add code
Sep 01, 2024
Figure 1 for SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks
Figure 2 for SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks
Figure 3 for SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks
Figure 4 for SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks
Viaarxiv icon

Universally Robust Graph Neural Networks by Preserving Neighbor Similarity

Add code
Jan 18, 2024
Figure 1 for Universally Robust Graph Neural Networks by Preserving Neighbor Similarity
Figure 2 for Universally Robust Graph Neural Networks by Preserving Neighbor Similarity
Figure 3 for Universally Robust Graph Neural Networks by Preserving Neighbor Similarity
Figure 4 for Universally Robust Graph Neural Networks by Preserving Neighbor Similarity
Viaarxiv icon

Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,

Add code
Dec 12, 2023
Figure 1 for Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,
Figure 2 for Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,
Figure 3 for Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,
Figure 4 for Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,
Viaarxiv icon

Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks

Add code
Dec 07, 2023
Figure 1 for Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks
Figure 2 for Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks
Figure 3 for Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks
Figure 4 for Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks
Viaarxiv icon

Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach

Add code
Aug 02, 2023
Figure 1 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Figure 2 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Figure 3 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Figure 4 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Viaarxiv icon

Dual-Space Attacks against Random-Walk-based Anomaly Detection

Add code
Jul 26, 2023
Figure 1 for Dual-Space Attacks against Random-Walk-based Anomaly Detection
Figure 2 for Dual-Space Attacks against Random-Walk-based Anomaly Detection
Figure 3 for Dual-Space Attacks against Random-Walk-based Anomaly Detection
Figure 4 for Dual-Space Attacks against Random-Walk-based Anomaly Detection
Viaarxiv icon

Homophily-Driven Sanitation View for Robust Graph Contrastive Learning

Add code
Jul 24, 2023
Figure 1 for Homophily-Driven Sanitation View for Robust Graph Contrastive Learning
Figure 2 for Homophily-Driven Sanitation View for Robust Graph Contrastive Learning
Figure 3 for Homophily-Driven Sanitation View for Robust Graph Contrastive Learning
Figure 4 for Homophily-Driven Sanitation View for Robust Graph Contrastive Learning
Viaarxiv icon

Simple yet Effective Gradient-Free Graph Convolutional Networks

Add code
Feb 01, 2023
Figure 1 for Simple yet Effective Gradient-Free Graph Convolutional Networks
Figure 2 for Simple yet Effective Gradient-Free Graph Convolutional Networks
Figure 3 for Simple yet Effective Gradient-Free Graph Convolutional Networks
Figure 4 for Simple yet Effective Gradient-Free Graph Convolutional Networks
Viaarxiv icon