-
[Adversarial label-flipping attack and defense for graph neural networks](https://ieeexplore.ieee.org/abstract/document/9338299/)
[Adversarial_Label-Flipping_Attack_and_Defense_for_Graph_Neural_Netwo…
-
Hello, I would like to ask how the pictures in the Result folder are drawn. Why are the pictures I get after running the program different?
![image](https://github.com/li-zhenyuan/Knowledge-enhanced-…
-
Dear Experts, I have deployed Dejavu on my LAN which is not connected to internet. Everything is working and I am getting logs on console, but attack graph is not visible. How I can view attack graph?
-
https://ieeexplore.ieee.org/abstract/document/10543212
```bib
@article{yan2024robust,
title={Robust Regularization Design of Graph Neural Networks Against Adversarial Attacks Based on Lyapunov Th…
-
Thanks for sharing the code. I'd like to ask you some questions about the attacked graph.
When I was trying to reproduce the results of Table 4 in your paper, I realized that the file of the pertur…
-
Thanks for sharing the code. I'd like to ask you about the details of the attacked graph.
I find that the perturbed_adj generated by mettack or nettack methods is symmetric.
But when I get the pert…
-
A heavily used feature for me, I note upon returning to EvE recently that in the most recent version of Pyfa this doesn't seem to be possible. Could it be restored? i.e. my use case was graphing bet…
-
## CVE-2024-21538 - High Severity Vulnerability
Vulnerable Libraries - cross-spawn-7.0.3.tgz, cross-spawn-6.0.5.tgz
cross-spawn-7.0.3.tgz
Cross platform child_process#spawn and child_process#spawn…
-
I would like to ask if the adversarial example attacks on the graph are all for GCN? Could it be applied to other inductive graph neural network models, such as GAT and GraphSAGE?
-
### Background:
[Langsmith Evaluations](https://docs.smith.langchain.com/concepts/evaluation) are a way to evaluate the performance of Automatic Import.
The [evaluation framework](https://docs.smith…