{"id":"https://openalex.org/W3196012972","doi":"https://doi.org/10.1109/sp46214.2022.9833806","title":"LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis","display_name":"LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W3196012972","doi":"https://doi.org/10.1109/sp46214.2022.9833806","mag":"3196012972"},"language":"en","primary_location":{"id":"doi:10.1109/sp46214.2022.9833806","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833806","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113597664","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-9280-8378"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fan Wu","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034045140","display_name":"Yunhui Long","orcid":"https://orcid.org/0009-0007-2603-5550"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yunhui Long","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004750246","display_name":"Ce Zhang","orcid":"https://orcid.org/0000-0001-5100-3584"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ce Zhang","raw_affiliation_strings":["ETH Z&#x00FC;rich"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100374360","display_name":"Bo Li","orcid":"https://orcid.org/0000-0001-6709-0942"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Li","raw_affiliation_strings":["University of Illinois at Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113597664"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":7.5136,"has_fulltext":false,"cited_by_count":77,"citation_normalized_percentile":{"value":0.97954425,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2005","last_page":"2024"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.814430832862854},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5992011427879333},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5458011627197266},{"id":"https://openalex.org/keywords/adjacency-list","display_name":"Adjacency list","score":0.4726744592189789},{"id":"https://openalex.org/keywords/adjacency-matrix","display_name":"Adjacency matrix","score":0.4620956480503082},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4598778784275055},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.45795994997024536},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.45390570163726807},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4277162551879883},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3840484321117401},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3636811077594757},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17285963892936707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13739866018295288}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.814430832862854},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5992011427879333},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5458011627197266},{"id":"https://openalex.org/C110484373","wikidata":"https://www.wikidata.org/wiki/Q264398","display_name":"Adjacency list","level":2,"score":0.4726744592189789},{"id":"https://openalex.org/C180356752","wikidata":"https://www.wikidata.org/wiki/Q727035","display_name":"Adjacency matrix","level":3,"score":0.4620956480503082},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4598778784275055},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.45795994997024536},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.45390570163726807},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4277162551879883},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3840484321117401},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3636811077594757},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17285963892936707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13739866018295288},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46214.2022.9833806","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833806","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":81,"referenced_works":["https://openalex.org/W1544573083","https://openalex.org/W1903029394","https://openalex.org/W1992461601","https://openalex.org/W2019735187","https://openalex.org/W2027595342","https://openalex.org/W2028584480","https://openalex.org/W2065228400","https://openalex.org/W2080900058","https://openalex.org/W2087742979","https://openalex.org/W2096870293","https://openalex.org/W2119404697","https://openalex.org/W2142356177","https://openalex.org/W2150611147","https://openalex.org/W2168433392","https://openalex.org/W2169861334","https://openalex.org/W2196215201","https://openalex.org/W2403599181","https://openalex.org/W2475658966","https://openalex.org/W2624431344","https://openalex.org/W2766453196","https://openalex.org/W2766587611","https://openalex.org/W2795435272","https://openalex.org/W2804057010","https://openalex.org/W2807021761","https://openalex.org/W2901504064","https://openalex.org/W2946297661","https://openalex.org/W2949945331","https://openalex.org/W2954831790","https://openalex.org/W2961295589","https://openalex.org/W2963070423","https://openalex.org/W2964015378","https://openalex.org/W2964051675","https://openalex.org/W2964114465","https://openalex.org/W2964283260","https://openalex.org/W2967845947","https://openalex.org/W2967985550","https://openalex.org/W2972986629","https://openalex.org/W2975966238","https://openalex.org/W2982108874","https://openalex.org/W2994968268","https://openalex.org/W2996268457","https://openalex.org/W3006663570","https://openalex.org/W3011124515","https://openalex.org/W3022536969","https://openalex.org/W3026224528","https://openalex.org/W3028302264","https://openalex.org/W3091473186","https://openalex.org/W3094387590","https://openalex.org/W3100848837","https://openalex.org/W3150395569","https://openalex.org/W3189551349","https://openalex.org/W3196012972","https://openalex.org/W3203792750","https://openalex.org/W4210257598","https://openalex.org/W4285719527","https://openalex.org/W4288101963","https://openalex.org/W4288563649","https://openalex.org/W4289389616","https://openalex.org/W4294558607","https://openalex.org/W4297733535","https://openalex.org/W6632698527","https://openalex.org/W6677736305","https://openalex.org/W6679290131","https://openalex.org/W6687403153","https://openalex.org/W6726873649","https://openalex.org/W6738964360","https://openalex.org/W6751569023","https://openalex.org/W6752110883","https://openalex.org/W6755863455","https://openalex.org/W6762814303","https://openalex.org/W6763736615","https://openalex.org/W6765543928","https://openalex.org/W6766230460","https://openalex.org/W6768533090","https://openalex.org/W6771932116","https://openalex.org/W6776644305","https://openalex.org/W6777775360","https://openalex.org/W6778091624","https://openalex.org/W6784758301","https://openalex.org/W6802153251","https://openalex.org/W6807384801"],"related_works":["https://openalex.org/W4213150077","https://openalex.org/W2369410163","https://openalex.org/W2982430984","https://openalex.org/W2059018062","https://openalex.org/W1991172810","https://openalex.org/W125803343","https://openalex.org/W2564285047","https://openalex.org/W4280593160","https://openalex.org/W2000173816","https://openalex.org/W2604585036"],"abstract_inverted_index":{"Graph":[0],"structured":[1],"data":[2,38,45,49,62,75,99],"have":[3,64],"enabled":[4],"several":[5],"successful":[6],"applications":[7],"such":[8,43],"as":[9,246,248],"recommendation":[10],"systems":[11],"and":[12,20,27,34,92,131,149,212,312],"traffic":[13],"prediction,":[14],"given":[15],"the":[16,55,89,98,115,128,151,155,175,227,299,306],"rich":[17],"node":[18,56,103,109,147],"features":[19,26,57,104,110,148],"edges":[21,203],"information.":[22,117],"However,":[23],"these":[24,266],"high-dimensional":[25],"high-order":[28],"adjacency":[29,116],"information":[30,130,178],"are":[31,270],"usually":[32],"heterogeneous":[33],"held":[35,179],"by":[36,180],"different":[37,61,205,217],"holders":[39,63],"in":[40,204,298],"practice.":[41],"Given":[42],"vertical":[44],"partition":[46],"e.g.,":[47],"one":[48],"holder":[50,100],"will":[51,105,119,285],"only":[52],"own":[53],"either":[54],"or":[58],"edge":[59,90,177],"information),":[60],"to":[65,76,80,111,136,144,153,173,196,260],"develop":[66],"efficient":[67],"joint":[68,129],"training":[69,95,108,245],"protocols":[70],"rather":[71],"than":[72],"directly":[73],"transferring":[74],"each":[77],"other":[78],"due":[79],"privacy":[81,167,228,279,316],"concerns.":[82],"In":[83],"this":[84,161],"paper,":[85],"we":[86,163,232],"focus":[87],"on":[88,257,288],"privacy,":[91],"consider":[93],"a":[94,122,166,198,250],"scenario":[96],"where":[97],"Bob":[101,141],"with":[102,127],"first":[106,164],"send":[107],"Alice":[112,118,181],"who":[113],"owns":[114],"then":[120,189],"train":[121],"graph":[123,218,240],"neural":[124],"network":[125,242],"(GNN)":[126],"provide":[132,145,301],"an":[133,234,302],"inference":[134,139],"API":[135,152],"Bob.":[137,187],"During":[138],"time,":[140],"is":[142,194],"able":[143,195],"test":[146,158],"query":[150],"obtain":[154],"predictions":[156],"for":[157,186,230,237],"nodes.":[159],"Under":[160],"setting,":[162],"propose":[165,249],"attack":[168],"LINKTELLER":[169,193,275],"via":[170,182],"influence":[171],"analysis":[172],"infer":[174],"private":[176,202,239],"designing":[183,292],"adversarial":[184],"queries":[185],"We":[188,263],"empirically":[190,276],"show":[191,264],"that":[192,265],"recover":[197],"significant":[199],"amount":[200],"of":[201],"settings,":[206],"both":[207],"including":[208],"inductive":[209],"(8":[210],"datasets)":[211],"transductive":[213],"(3":[214],"datasets),":[215],"under":[216,277],"densities,":[219],"significantly":[220],"outperforming":[221],"existing":[222,235],"baselines.":[223],"To":[224],"further":[225],"evaluate":[226,261],"leakage":[229],"edges,":[231],"adapt":[233],"algorithm":[236],"differentially":[238],"convolutional":[241],"(DP":[243],"GCN)":[244],"well":[247],"new":[251],"DP":[252,267],"GCN":[253,268,296,309],"mechanism":[254,259],"LAPGRAPH":[255],"based":[256],"Laplacian":[258],"LINKTELLER.":[262],"mechanisms":[269],"not":[271],"always":[272],"resilient":[273,294],"against":[274,314],"mild":[278],"guarantees":[280],"$(\\varepsilon\\gt":[281],"5)$.":[282],"Our":[283],"studies":[284],"shed":[286],"light":[287],"future":[289],"research":[290],"towards":[291],"more":[293],"privacy-preserving":[295],"models;":[297],"meantime,":[300],"in-depth":[303],"understanding":[304],"about":[305],"tradeoff":[307],"between":[308],"model":[310],"utility":[311],"robustness":[313],"potential":[315],"attacks.":[317]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":8}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
