<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Graph Security | Jiangtong Li</title><link>https://www.jiangtongli.me/tags/graph-security/</link><atom:link href="https://www.jiangtongli.me/tags/graph-security/index.xml" rel="self" type="application/rss+xml"/><description>Graph Security</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Mon, 01 Dec 2025 00:00:00 +0000</lastBuildDate><image><url>https://www.jiangtongli.me/media/icon_hu68170e94a17a2a43d6dcb45cf0e8e589_3079_512x512_fill_lanczos_center_3.png</url><title>Graph Security</title><link>https://www.jiangtongli.me/tags/graph-security/</link></image><item><title>Attack by Yourself: Effective and Unnoticeable Multi-Category Graph Backdoor Attacks with Subgraph Triggers Pool</title><link>https://www.jiangtongli.me/publication/neurips2025-attackbyyourself/</link><pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate><guid>https://www.jiangtongli.me/publication/neurips2025-attackbyyourself/</guid><description/></item></channel></rss>