Author of the publication

Link Stealing Attacks Against Inductive Graph Neural Networks.

, , , , , , and . Proc. Priv. Enhancing Technol., 2024 (4): 818-839 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of Trustee-based Social Authentications., and . CoRR, (2014)Efficient Top-K Query Algorithms Using Density Index., , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 38-45. Springer, (2011)Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing., , , and . ICLR, OpenReview.net, (2020)MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples., , , , and . ACM Conference on Computer and Communications Security, page 259-274. ACM, (2019)Reciprocal versus parasocial relationships in online social networks., and . Soc. Netw. Anal. Min., 4 (1): 184 (2014)SybilSCAR: Sybil detection in online social networks via local rule based propagation., , and . INFOCOM, page 1-9. IEEE, (2017)Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge., and . INFOCOM, page 2008-2016. IEEE, (2019)Almost Tight L0-norm Certified Robustness of Top-k Predictions against Adversarial Perturbations., , , , and . CoRR, (2020)Practical Blind Membership Inference Attack via Differential Comparisons., , , , , and . NDSS, The Internet Society, (2021)Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach., , , , , , , , and . KDD, page 3240-3250. ACM, (2021)