{"id":"https://openalex.org/W3171131018","doi":"https://doi.org/10.1109/tkde.2021.3087515","title":"NetFense: Adversarial Defenses against Privacy Attacks on Neural Networks for Graph Data","display_name":"NetFense: Adversarial Defenses against Privacy Attacks on Neural Networks for Graph Data","publication_year":2021,"publication_date":"2021-06-09","ids":{"openalex":"https://openalex.org/W3171131018","doi":"https://doi.org/10.1109/tkde.2021.3087515","mag":"3171131018"},"language":"en","primary_location":{"id":"doi:10.1109/tkde.2021.3087515","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tkde.2021.3087515","pdf_url":"https://ieeexplore.ieee.org/ielx7/69/9973432/09448513.pdf","source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/69/9973432/09448513.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070909454","display_name":"I-Chung Hsieh","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"I-Chung Hsieh","raw_affiliation_strings":["Institute of Data Science, National Cheng Kung University, 34912 Tainan, TW - Taiwan, Taiwan, (e-mail: q00117888@gmail.com)"],"affiliations":[{"raw_affiliation_string":"Institute of Data Science, National Cheng Kung University, 34912 Tainan, TW - Taiwan, Taiwan, (e-mail: q00117888@gmail.com)","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014600496","display_name":"Cheng\u2013Te Li","orcid":"https://orcid.org/0000-0001-7995-4787"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Cheng-Te Li","raw_affiliation_strings":["Institute of Data Science, National Cheng Kung University, 34912 Tainan, Taiwan, Taiwan, (e-mail: reliefli@gmail.com)"],"affiliations":[{"raw_affiliation_string":"Institute of Data Science, National Cheng Kung University, 34912 Tainan, Taiwan, Taiwan, (e-mail: reliefli@gmail.com)","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070909454"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":2.5193,"has_fulltext":true,"cited_by_count":23,"citation_normalized_percentile":{"value":0.91037772,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8280608654022217},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6552003026008606},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6486021876335144},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.5906479954719543},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5439044237136841},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5194534659385681},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4245755672454834},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4171733856201172},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.41427043080329895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3777529299259186},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36858057975769043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34495916962623596},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.1566389501094818}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8280608654022217},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6552003026008606},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6486021876335144},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.5906479954719543},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5439044237136841},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5194534659385681},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4245755672454834},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4171733856201172},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.41427043080329895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3777529299259186},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36858057975769043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34495916962623596},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.1566389501094818},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tkde.2021.3087515","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tkde.2021.3087515","pdf_url":"https://ieeexplore.ieee.org/ielx7/69/9973432/09448513.pdf","source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2106.11865","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2106.11865","pdf_url":"https://arxiv.org/pdf/2106.11865","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1109/tkde.2021.3087515","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tkde.2021.3087515","pdf_url":"https://ieeexplore.ieee.org/ielx7/69/9973432/09448513.pdf","source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G175705802","display_name":null,"funder_award_id":"109-2221-E-006-173","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"},{"id":"https://openalex.org/G2256031840","display_name":null,"funder_award_id":"109-2636-E-006-017","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"},{"id":"https://openalex.org/G2270262040","display_name":null,"funder_award_id":"AS-TP-107-M05","funder_id":"https://openalex.org/F4320321041","funder_display_name":"Academia Sinica"},{"id":"https://openalex.org/G5742568945","display_name":null,"funder_award_id":"Fellowship","funder_id":"https://openalex.org/F4320321041","funder_display_name":"Academia Sinica"}],"funders":[{"id":"https://openalex.org/F4320321041","display_name":"Academia Sinica","ror":"https://ror.org/05bxb3784"},{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3171131018.pdf","grobid_xml":"https://content.openalex.org/works/W3171131018.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1854214752","https://openalex.org/W1873763122","https://openalex.org/W1945616565","https://openalex.org/W2000042664","https://openalex.org/W2103133870","https://openalex.org/W2526910689","https://openalex.org/W2578456176","https://openalex.org/W2788262295","https://openalex.org/W2803831897","https://openalex.org/W2809206206","https://openalex.org/W2809414288","https://openalex.org/W2907492528","https://openalex.org/W2914953695","https://openalex.org/W2949208225","https://openalex.org/W2961344605","https://openalex.org/W2962711740","https://openalex.org/W2963165448","https://openalex.org/W2963268689","https://openalex.org/W2963791934","https://openalex.org/W2963920355","https://openalex.org/W2964015378","https://openalex.org/W2964283260","https://openalex.org/W2964583308","https://openalex.org/W2964965220","https://openalex.org/W2964971928","https://openalex.org/W2966149470","https://openalex.org/W2972209102","https://openalex.org/W2984488829","https://openalex.org/W2989872778","https://openalex.org/W2994598354","https://openalex.org/W2998122931","https://openalex.org/W3012123536","https://openalex.org/W3098276446","https://openalex.org/W3102415183","https://openalex.org/W3103362336","https://openalex.org/W3104667978","https://openalex.org/W4210257598","https://openalex.org/W4247891181","https://openalex.org/W4289389616","https://openalex.org/W4289548567","https://openalex.org/W4297733535","https://openalex.org/W6639055396","https://openalex.org/W6639246211","https://openalex.org/W6640425456","https://openalex.org/W6726873649","https://openalex.org/W6745537798","https://openalex.org/W6751569023","https://openalex.org/W6754929296","https://openalex.org/W6755863455","https://openalex.org/W6774869656"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2040808657","https://openalex.org/W4239582170","https://openalex.org/W2918664383","https://openalex.org/W3123119822","https://openalex.org/W106056076","https://openalex.org/W4320855730","https://openalex.org/W2135200719","https://openalex.org/W2748281644","https://openalex.org/W2989394982"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,42,189],"protecting":[3,125],"node":[4],"privacy":[5,53,75,127,172,194],"on":[6,99,132,157],"graph":[7,11,80,92,101,140],"data":[8,93,113,141,152,190],"and":[9,77,115,134,161,192],"attacking":[10],"neural":[12],"networks":[13],"(GNNs)":[14],"gain":[15],"much":[16],"attention.":[17],"The":[18],"eye":[19],"does":[20],"not":[21],"bring":[22,177],"these":[23],"two":[24],"essential":[25],"tasks":[26],"together":[27],"yet.":[28],"Imagine":[29],"an":[30],"adversary":[31],"can":[32,47,89,149],"utilize":[33],"the":[34,57,86,100,104,117,126,144,164,182],"powerful":[35],"GNNs":[36],"to":[37,84],"infer":[38],"users\u2019":[39],"private":[40,121,168],"labels":[41],"a":[43,67,79],"social":[44],"network.":[45],"How":[46],"we":[48,65],"adversarially":[49],"defend":[50],"against":[51,73],"such":[52,180],"attacks":[54],"while":[55],"maintaining":[56],"utility":[58,153],"of":[59,107,120,128,167,184],"perturbed":[60,145],"graphs?":[61],"In":[62],"this":[63],"work,":[64],"propose":[66],"novel":[68],"research":[69],"task,":[70],"adversarial":[71],"defenses":[72],"GNN-based":[74],"attacks,":[76],"present":[78],"perturbation-based":[81],"approach,":[82],"NetFense,":[83,185],"achieve":[85],"goal.":[87],"NetFense":[88,148],"simultaneously":[90],"keep":[91],"unnoticeability":[94],"(i.e.,":[95,111,124,154,171],"having":[96],"limited":[97],"changes":[98],"structure),":[102],"maintain":[103,151],"prediction":[105,118,165],"confidence":[106,119,166],"targeted":[108,158],"label":[109,122,159,169],"classification":[110,123,160,170],"preserving":[112,186],"utility),":[114],"reduce":[116],"nodes).":[129],"Experiments":[130],"conducted":[131],"single-":[133],"multiple-target":[135],"perturbations":[136],"using":[137],"three":[138],"real":[139],"exhibit":[142],"that":[143],"graphs":[146],"by":[147],"effectively":[150],"model":[155],"unnoticeability)":[156],"significantly":[162],"decrease":[163],"protection).":[173],"Extensive":[174],"studies":[175],"also":[176],"several":[178],"insights,":[179],"as":[181],"flexibility":[183],"local":[187],"neighborhoods":[188],"unnoticeability,":[191],"better":[193],"protection":[195],"for":[196],"high-degree":[197],"nodes.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2021-06-22T00:00:00"}
