Awesome
STRG
The codes of the paper---Revisiting Graph Adversarial Attack and Defense From a Data Distribution Perspective
A self-training defense method and a heuristic attack method
The codes of the paper---Revisiting Graph Adversarial Attack and Defense From a Data Distribution Perspective
A self-training defense method and a heuristic attack method