Home

Awesome

STRG

The codes of the paper---Revisiting Graph Adversarial Attack and Defense From a Data Distribution Perspective

A self-training defense method and a heuristic attack method