Graph Construction

ATAG: AI-Agent Application Threat Assessment with Attack Graphs

Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03
Indirect Prompt Injection
Graph Construction
Risk Assessment

On the Price of Differential Privacy for Hierarchical Clustering

Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22
Graph Construction
Privacy protection framework
Watermarking Technology

Graph Mining for Cybersecurity: A Survey

Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16
Graph Embedding
Graph Construction
Security Analysis

Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging

Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11
Graph Construction
Privacy Assessment
Communication Model

StratLearner: Learning a Strategy for Misinformation Prevention in Social Networks

Authors: Guangmo Tong | Published: 2020-09-29
Graph Construction
Information Extraction
Optimization Methods

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

Authors: Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, Yang Liu | Published: 2019-09-08
Graph Construction
Data-Driven Vulnerability Assessment
Machine Learning

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

Authors: Xiaoqing Sun, Mingkai Tong, Jiahai Yang | Published: 2019-09-04
Graph Construction
Data Management System
Machine Learning Algorithm

A Graph-Based Machine Learning Approach for Bot Detection

Authors: Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba | Published: 2019-02-22
Graph Construction
Data Preprocessing
Bot Detection Method

Adversarial Attacks on Graph Neural Networks via Meta Learning

Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28
Graph Construction
Adversarial Example
Adversarial Attack Methods

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11
Graph Construction
Malware Detection Method
Classification Pattern Analysis