ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.11890
  4. Cited By
Graph Backdoor

Graph Backdoor

21 June 2020
Zhaohan Xi
Ren Pang
S. Ji
Ting Wang
    AI4CE
    AAML
ArXivPDFHTML

Papers citing "Graph Backdoor"

38 / 38 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
Xuewen Dong
Jiachen Li
Shujun Li
Zhichao You
Qiang Qu
Yaroslav Kholodov
Yulong Shen
AAML
38
0
0
12 Mar 2025
MADE: Graph Backdoor Defense with Masked Unlearning
MADE: Graph Backdoor Defense with Masked Unlearning
Xiao Lin amd Mingjie Li
Mingjie Li
Yisen Wang
AAML
95
1
0
03 Jan 2025
DMGNN: Detecting and Mitigating Backdoor Attacks in Graph Neural
  Networks
DMGNN: Detecting and Mitigating Backdoor Attacks in Graph Neural Networks
Hao Sui
Bing Chen
J. Zhang
Chengcheng Zhu
Di Wu
Qinghua Lu
Guodong Long
AAML
31
1
0
18 Oct 2024
Backdoor Attack on Vertical Federated Graph Neural Network Learning
Backdoor Attack on Vertical Federated Graph Neural Network Learning
Jirui Yang
Peng Chen
Zhihui Lu
Ruijun Deng
Qiang Duan
Jianping Zeng
AAML
FedML
129
0
0
15 Oct 2024
Krait: A Backdoor Attack Against Graph Prompt Tuning
Krait: A Backdoor Attack Against Graph Prompt Tuning
Ying Song
Rita Singh
Balaji Palanisamy
AAML
52
0
0
18 Jul 2024
Backdoor Graph Condensation
Backdoor Graph Condensation
Jiahao Wu
Ning Lu
Zeiyu Dai
Kun Wang
Wenqi Fan
Shengcai Liu
Qing Li
Ke Tang
AAML
DD
69
5
0
03 Jul 2024
GENIE: Watermarking Graph Neural Networks for Link Prediction
GENIE: Watermarking Graph Neural Networks for Link Prediction
Venkata Sai Pranav Bachina
Ankit Gangwal
Aaryan Ajay Sharma
Charu Sharma
50
1
0
07 Jun 2024
Link Stealing Attacks Against Inductive Graph Neural Networks
Link Stealing Attacks Against Inductive Graph Neural Networks
Yixin Wu
Xinlei He
Pascal Berrang
Mathias Humbert
Michael Backes
Neil Zhenqiang Gong
Yang Zhang
34
2
0
09 May 2024
Effective backdoor attack on graph neural networks in link prediction tasks
Effective backdoor attack on graph neural networks in link prediction tasks
Jiazhu Dai
Haoyu Sun
GNN
59
3
0
05 Jan 2024
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger
Yiming Li
Mingyan Zhu
Junfeng Guo
Tao Wei
Shu-Tao Xia
Zhan Qin
AAML
66
1
0
03 Dec 2023
XGBD: Explanation-Guided Graph Backdoor Detection
XGBD: Explanation-Guided Graph Backdoor Detection
Zihan Guan
Mengnan Du
Ninghao Liu
AAML
26
9
0
08 Aug 2023
Graph Neural Networks for Hardware Vulnerability Analysis -- Can you
  Trust your GNN?
Graph Neural Networks for Hardware Vulnerability Analysis -- Can you Trust your GNN?
Lilas Alrahis
Ozgur Sinanoglu
23
2
0
29 Mar 2023
Backdoor Attacks Against Dataset Distillation
Backdoor Attacks Against Dataset Distillation
Yugeng Liu
Zheng Li
Michael Backes
Yun Shen
Yang Zhang
DD
34
27
0
03 Jan 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
31
75
0
29 Dec 2022
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node
  Classification
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification
Yulin Zhu
Liang Tong
Gaolei Li
Xiapu Luo
Kai Zhou
33
4
0
25 Oct 2022
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks
  via Motifs
Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Haibin Zheng
Haiyang Xiong
Jinyin Chen
Hao-Shang Ma
Guohan Huang
39
28
0
25 Oct 2022
Transferable Graph Backdoor Attack
Transferable Graph Backdoor Attack
Shuiqiao Yang
Bao Gia Doan
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
D. Ranasinghe
S. Kanhere
AAML
34
36
0
21 Jun 2022
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of
  Source-Specific Backdoor Defences
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Shang Wang
Yansong Gao
Anmin Fu
Zhi-Li Zhang
Yuqing Zhang
W. Susilo
Dongxi Liu
AAML
29
10
0
31 May 2022
A Survey of Trustworthy Graph Learning: Reliability, Explainability, and
  Privacy Protection
A Survey of Trustworthy Graph Learning: Reliability, Explainability, and Privacy Protection
Bingzhe Wu
Jintang Li
Junchi Yu
Yatao Bian
Hengtong Zhang
...
Guangyu Sun
Peng Cui
Zibin Zheng
Zhe Liu
P. Zhao
OOD
30
25
0
20 May 2022
Trustworthy Graph Neural Networks: Aspects, Methods and Trends
Trustworthy Graph Neural Networks: Aspects, Methods and Trends
He Zhang
Bang Wu
Xingliang Yuan
Shirui Pan
Hanghang Tong
Jian Pei
45
104
0
16 May 2022
Projective Ranking-based GNN Evasion Attacks
Projective Ranking-based GNN Evasion Attacks
He Zhang
Xingliang Yuan
Chuan Zhou
Shirui Pan
AAML
39
23
0
25 Feb 2022
More is Better (Mostly): On the Backdoor Attacks in Federated Graph
  Neural Networks
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks
Jing Xu
Rui Wang
Stefanos Koffas
K. Liang
S. Picek
FedML
AAML
31
25
0
07 Feb 2022
Neighboring Backdoor Attacks on Graph Convolutional Network
Neighboring Backdoor Attacks on Graph Convolutional Network
Liang Chen
Qibiao Peng
Jintang Li
Yang Liu
Jiawei Chen
Yong Li
Zibin Zheng
GNN
AAML
32
11
0
17 Jan 2022
Model Stealing Attacks Against Inductive Graph Neural Networks
Model Stealing Attacks Against Inductive Graph Neural Networks
Yun Shen
Xinlei He
Yufei Han
Yang Zhang
16
60
0
15 Dec 2021
threaTrace: Detecting and Tracing Host-based Threats in Node Level
  Through Provenance Graph Learning
threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Su Wang
Zhiliang Wang
Tao Zhou
Xia Yin
Dongqi Han
Han Zhang
Hongbin Sun
Xingang Shi
Jiahai Yang
24
69
0
08 Nov 2021
Backdoor Pre-trained Models Can Transfer to All
Backdoor Pre-trained Models Can Transfer to All
Lujia Shen
S. Ji
Xuhong Zhang
Jinfeng Li
Jing Chen
Jie Shi
Chengfang Fang
Jianwei Yin
Ting Wang
AAML
SILM
31
117
0
30 Oct 2021
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction
Jinyin Chen
Haiyang Xiong
Haibin Zheng
Jian Andrew Zhang
Guodong Jiang
Yi Liu
AAML
SILM
AI4CE
43
10
0
08 Oct 2021
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Jiaming Mu
Binghui Wang
Qi Li
Kun Sun
Mingwei Xu
Zhuotao Liu
AAML
21
33
0
21 Aug 2021
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised
  Learning
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning
Jinyuan Jia
Yupei Liu
Neil Zhenqiang Gong
SILM
SSL
24
151
0
01 Aug 2021
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
Stefanos Koffas
Jing Xu
Mauro Conti
S. Picek
AAML
17
66
0
30 Jul 2021
Explainability-based Backdoor Attacks Against Graph Neural Networks
Explainability-based Backdoor Attacks Against Graph Neural Networks
Jing Xu
Minhui Xue
Xue
S. Picek
20
74
0
08 Apr 2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural
  Networks by Examining Differential Feature Symmetry
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Yingqi Liu
Guangyu Shen
Guanhong Tao
Zhenting Wang
Shiqing Ma
X. Zhang
AAML
22
8
0
16 Mar 2021
GraphAttacker: A General Multi-Task GraphAttack Framework
GraphAttacker: A General Multi-Task GraphAttack Framework
Jinyin Chen
Dunjie Zhang
Zhaoyan Ming
Kejie Huang
Wenrong Jiang
Chen Cui
AAML
36
14
0
18 Jan 2021
Multi-scale Attributed Node Embedding
Multi-scale Attributed Node Embedding
Benedek Rozemberczki
Carl Allen
Rik Sarkar
GNN
148
836
0
28 Sep 2019
Model-Reuse Attacks on Deep Learning Systems
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
134
186
0
02 Dec 2018
Bilevel Programming for Hyperparameter Optimization and Meta-Learning
Bilevel Programming for Hyperparameter Optimization and Meta-Learning
Luca Franceschi
P. Frasconi
Saverio Salzo
Riccardo Grazzi
Massimiliano Pontil
110
716
0
13 Jun 2018
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
261
3,109
0
04 Nov 2016
1