{"id":"https://openalex.org/W3205860677","doi":"https://doi.org/10.1109/tcss.2022.3161016","title":"Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning","display_name":"Graph-Fraudster: Adversarial Attacks on Graph Neural Network-Based Vertical Federated Learning","publication_year":2022,"publication_date":"2022-03-30","ids":{"openalex":"https://openalex.org/W3205860677","doi":"https://doi.org/10.1109/tcss.2022.3161016","mag":"3205860677"},"language":"en","primary_location":{"id":"doi:10.1109/tcss.2022.3161016","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3161016","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101758654","display_name":"Jinyin Chen","orcid":"https://orcid.org/0000-0002-7153-2755"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyin Chen","raw_affiliation_strings":["Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7153-2755","affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068404923","display_name":"Guohan Huang","orcid":"https://orcid.org/0000-0003-2850-6268"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guohan Huang","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-2850-6268","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072212265","display_name":"Haibin Zheng","orcid":"https://orcid.org/0000-0002-8997-5343"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibin Zheng","raw_affiliation_strings":["College of Computer Science and Technology, Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-8997-5343","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063370205","display_name":"Shanqing Yu","orcid":"https://orcid.org/0000-0001-5170-8082"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanqing Yu","raw_affiliation_strings":["Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-5170-8082","affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112228530","display_name":"Wenrong Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108177","display_name":"Zhejiang Police College","ror":"https://ror.org/01rxaf991","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210108177"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenrong Jiang","raw_affiliation_strings":["Zhejiang Police College, Big Data and Cyber Security Research Institute, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhejiang Police College, Big Data and Cyber Security Research Institute, Hangzhou, China","institution_ids":["https://openalex.org/I4210108177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101432700","display_name":"Chen Cui","orcid":"https://orcid.org/0009-0002-8351-2679"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Cui","raw_affiliation_strings":["College of Computer Science, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101758654"],"corresponding_institution_ids":["https://openalex.org/I55712492"],"apc_list":null,"apc_paid":null,"fwci":5.2717,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.96001501,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"10","issue":"2","first_page":"492","last_page":"506"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9358000159263611,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6985646486282349},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6948885321617126},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.692599356174469},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5248332619667053},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.502907931804657},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3932919502258301},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3550189733505249},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32173508405685425}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6985646486282349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6948885321617126},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.692599356174469},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5248332619667053},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.502907931804657},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3932919502258301},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3550189733505249},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32173508405685425}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcss.2022.3161016","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3161016","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2452714580","display_name":null,"funder_award_id":"62072406","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3448811327","display_name":null,"funder_award_id":"62103374","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G766105527","display_name":null,"funder_award_id":"LGF20F020016","funder_id":"https://openalex.org/F4320338468","funder_display_name":"Basic Public Welfare Research Program of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338468","display_name":"Basic Public Welfare Research Program of Zhejiang Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":76,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2109426455","https://openalex.org/W2152284345","https://openalex.org/W2153959628","https://openalex.org/W2162630660","https://openalex.org/W2283463896","https://openalex.org/W2519887557","https://openalex.org/W2530417694","https://openalex.org/W2541884796","https://openalex.org/W2591882872","https://openalex.org/W2803678876","https://openalex.org/W2803831897","https://openalex.org/W2804285737","https://openalex.org/W2892247084","https://openalex.org/W2898165197","https://openalex.org/W2899157217","https://openalex.org/W2904190483","https://openalex.org/W2912213068","https://openalex.org/W2924806045","https://openalex.org/W2930926105","https://openalex.org/W2945796017","https://openalex.org/W2948612734","https://openalex.org/W2949208225","https://openalex.org/W2962688627","https://openalex.org/W2963207607","https://openalex.org/W2964015378","https://openalex.org/W2964124573","https://openalex.org/W2964283260","https://openalex.org/W2964583308","https://openalex.org/W2966149470","https://openalex.org/W2970408908","https://openalex.org/W2997404190","https://openalex.org/W3006970599","https://openalex.org/W3012721701","https://openalex.org/W3013721857","https://openalex.org/W3026224528","https://openalex.org/W3091476023","https://openalex.org/W3100628356","https://openalex.org/W3102078694","https://openalex.org/W3103245149","https://openalex.org/W3107100345","https://openalex.org/W3108940306","https://openalex.org/W3110987679","https://openalex.org/W3126230197","https://openalex.org/W3127173367","https://openalex.org/W3130421912","https://openalex.org/W3154667344","https://openalex.org/W3157496929","https://openalex.org/W3160274714","https://openalex.org/W3169324926","https://openalex.org/W3172884193","https://openalex.org/W3173377676","https://openalex.org/W3175646727","https://openalex.org/W4212816240","https://openalex.org/W4285603628","https://openalex.org/W4303685612","https://openalex.org/W4318619660","https://openalex.org/W6640425456","https://openalex.org/W6726873649","https://openalex.org/W6728757088","https://openalex.org/W6751569023","https://openalex.org/W6755124781","https://openalex.org/W6755572291","https://openalex.org/W6757172675","https://openalex.org/W6758757267","https://openalex.org/W6760001035","https://openalex.org/W6763048141","https://openalex.org/W6763554540","https://openalex.org/W6775806637","https://openalex.org/W6785373086","https://openalex.org/W6787066409","https://openalex.org/W6790009805","https://openalex.org/W6791120749","https://openalex.org/W6794274047","https://openalex.org/W6794961162","https://openalex.org/W6798114851"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Graph":[0],"neural":[1],"network":[2],"(GNN)":[3],"has":[4,76,92],"achieved":[5],"great":[6],"success":[7],"on":[8,104,120,189],"graph":[9],"representation":[10],"learning.":[11],"Challenged":[12],"by":[13],"large-scale":[14],"private":[15],"data":[16,50],"collected":[17],"from":[18],"user":[19],"side,":[20],"GNN":[21,75,206],"may":[22],"not":[23,93],"be":[24,87,247],"able":[25],"to":[26,47,67,80,164,177,215,236],"reflect":[27],"the":[28,39,84,90,98,121,127,131,140,151,154,166,170,181,197,233,238],"excellent":[29],"performance,":[30],"without":[31],"rich":[32],"features":[33],"and":[34,130,144,244],"complete":[35],"adjacent":[36],"relationships.":[37],"Addressing":[38],"problem,":[40],"vertical":[41],"federated":[42],"learning":[43],"(VFL)":[44],"is":[45,63,97,111,159,175],"proposed":[46],"implement":[48],"local":[49],"protection":[51],"through":[52],"training":[53],"a":[54,64,69,147,213],"global":[55,123,141],"model":[56,149],"collaboratively.":[57],"Consequently,":[58],"for":[59,153,232],"graph-structured":[60],"data,":[61],"it":[62],"natural":[65],"idea":[66],"construct":[68],"GNN-based":[70],"VFL":[71],"(GVFL)":[72],"framework.":[73],"However,":[74],"been":[77,94],"proven":[78],"vulnerable":[79],"adversarial":[81,102,108,117],"attacks.":[82],"Whether":[83],"vulnerability":[85],"will":[86],"brought":[88],"into":[89,161],"GVFL":[91,216],"studied.":[95],"This":[96],"first":[99],"study":[100],"of":[101,133,150,172,183,240],"attacks":[103,179],"GVFL.":[105,241],"A":[106],"novel":[107],"attack":[109,155,199],"method":[110],"proposed,":[112],"named":[113],"Graph-Fraudster.":[114],"It":[115],"generates":[116],"perturbations":[118],"based":[119,207],"noise-added":[122,184],"node":[124,142,162,174,185],"embeddings":[125,143,163],"via":[126],"privacy":[128],"leakage":[129],"gradient":[132,171],"pairwise":[134,173],"node.":[135],"Specifically,":[136],"first,":[137],"Graph-Fraudster":[138,195,210],"steals":[139],"sets":[145],"up":[146],"shadow":[148,167],"server":[152],"generator.":[156],"Second,":[157],"noise":[158],"added":[160],"confuse":[165],"model.":[168],"Finally,":[169],"used":[176],"generate":[178],"with":[180,202],"guidance":[182],"embeddings.":[186],"Extensive":[187],"experiments":[188],"five":[190],"benchmark":[191],"datasets":[192,245],"demonstrate":[193],"that":[194],"achieves":[196],"state-of-the-art":[198],"performance":[200],"compared":[201],"baselines":[203],"in":[204],"different":[205],"GVFLs.":[208],"Furthermore,":[209],"can":[211,246],"remain":[212],"threat":[214],"even":[217],"if":[218],"two":[219],"possible":[220],"defense":[221],"mechanisms":[222],"are":[223,229],"applied.":[224],"In":[225],"addition,":[226],"some":[227],"suggestions":[228],"put":[230],"forward":[231],"future":[234],"work":[235],"improve":[237],"robustness":[239],"The":[242],"code":[243],"downloaded":[248],"at":[249],"<uri":[250],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[251],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/hgh0545/Graph-Fraudster</uri>":[252],".":[253]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
