Alert button

Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs

Mar 26, 2024
Jane Downer, Ren Wang, Binghui Wang

Figure 1 for Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs
Figure 2 for Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs
Figure 3 for Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs
Figure 4 for Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: