MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs Authors: Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jorg Henkel, Mehdi Tahoori | Published: 2024-03-04 FPGAGraph Neural NetworkMulti-Tenancy 2024.03.04 2025.05.27 Literature Database
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion Authors: Nan Xiao, Bo Lang, Ting Wang, Yikai Chen | Published: 2024-02-20 Graph Neural NetworkIoC Analysis MethodAutomated Threat Attribution 2024.02.20 2025.05.27 Literature Database
LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking Authors: Yeganeh Aghamohammadi, Amin Rezaei | Published: 2024-02-06 Graph Neural NetworkModel InterpretabilityWatermark Evaluation 2024.02.06 2025.05.27 Literature Database
PAC-Bayesian Adversarially Robust Generalization Bounds for Graph Neural Network Authors: Tan Sun, Junhong Lin | Published: 2024-02-06 | Updated: 2024-07-06 Graph Neural NetworkAdversarial ExampleWatermark Evaluation 2024.02.06 2025.05.27 Literature Database
X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System Authors: Kiymet Kaya, Elif Ak, Sumeyye Bas, Berk Canberk, Sule Gunduz Oguducu | Published: 2024-02-01 | Updated: 2024-06-02 Graph Neural NetworkXAI (Explainable AI)Intrusion Detection System 2024.02.01 2025.05.27 Literature Database
Use of Graph Neural Networks in Aiding Defensive Cyber Operations Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11 Graph Neural NetworkIntrusion Detection SystemAnomaly Detection Method 2024.01.11 2025.05.27 Literature Database
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13 Graph Neural NetworkFingerprinting MethodRobustness Evaluation 2023.12.13 2025.05.28 Literature Database
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks Authors: Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan | Published: 2023-12-13 Graph Neural NetworkData Privacy AssessmentMembership Inference 2023.12.13 2025.05.28 Literature Database
ELEGANT: Certified Defense on the Fairness of Graph Neural Networks Authors: Yushun Dong, Binchi Zhang, Hanghang Tong, Jundong Li | Published: 2023-11-05 Graph Neural NetworkBias Mitigation TechniquesPrompt Injection 2023.11.05 2025.05.28 Literature Database
Deceptive Fairness Attacks on Graphs via Meta Learning Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24 Graph Neural NetworkAttack Methodevaluation metrics 2023.10.24 2025.05.28 Literature Database