{"id":"https://openalex.org/W4308642974","doi":"https://doi.org/10.1145/3548606.3559358","title":"Finding MNEMON","display_name":"Finding MNEMON","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308642974","doi":"https://doi.org/10.1145/3548606.3559358"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559358","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559358","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050781579","display_name":"Yun Shen","orcid":"https://orcid.org/0000-0001-7863-8475"},"institutions":[{"id":"https://openalex.org/I1283576576","display_name":"NetApp (United States)","ror":"https://ror.org/05c4cm338","country_code":"US","type":"company","lineage":["https://openalex.org/I1283576576"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yun Shen","raw_affiliation_strings":["NetApp, Bristol, United Kingdom","NetApp"],"affiliations":[{"raw_affiliation_string":"NetApp, Bristol, United Kingdom","institution_ids":[]},{"raw_affiliation_string":"NetApp","institution_ids":["https://openalex.org/I1283576576"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100882803","display_name":"Yufei Han","orcid":"https://orcid.org/0009-0006-8640-0815"},"institutions":[{"id":"https://openalex.org/I4210133778","display_name":"Inria Rennes - Bretagne Atlantique Research Centre","ror":"https://ror.org/04040yw90","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yufei Han","raw_affiliation_strings":["Inria, Rennes, France","Inria Rennes \u2013 Bretagne Atlantique","Confidentialit\u00e9, Int\u00e9grit\u00e9, Disponibilit\u00e9 et R\u00e9partition"],"affiliations":[{"raw_affiliation_string":"Inria, Rennes, France","institution_ids":["https://openalex.org/I4210133778"]},{"raw_affiliation_string":"Inria Rennes \u2013 Bretagne Atlantique","institution_ids":["https://openalex.org/I4210133778"]},{"raw_affiliation_string":"Confidentialit\u00e9, Int\u00e9grit\u00e9, Disponibilit\u00e9 et R\u00e9partition","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100746182","display_name":"Zhikun Zhang","orcid":"https://orcid.org/0000-0001-7208-3392"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Zhikun Zhang","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","Helmholtz Center for Information Security [Saarbr\u00fccken]"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]},{"raw_affiliation_string":"Helmholtz Center for Information Security [Saarbr\u00fccken]","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337210","display_name":"Min Chen","orcid":"https://orcid.org/0000-0002-1128-7989"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN","DE"],"is_corresponding":false,"raw_author_name":"Min Chen","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","Center for It-Security, Privacy & Accountability"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]},{"raw_affiliation_string":"Center for It-Security, Privacy & Accountability","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101948686","display_name":"Ting Yu","orcid":"https://orcid.org/0009-0006-2449-8300"},"institutions":[{"id":"https://openalex.org/I1301390666","display_name":"Qatar Airways (Qatar)","ror":"https://ror.org/01hx00y13","country_code":"QA","type":"company","lineage":["https://openalex.org/I1301390666"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ting Yu","raw_affiliation_strings":["Qatar Computing Research Institute, Doha, Qatar","Qatar Computing Research Institute [Doha, Qatar]"],"affiliations":[{"raw_affiliation_string":"Qatar Computing Research Institute, Doha, Qatar","institution_ids":["https://openalex.org/I1301390666"]},{"raw_affiliation_string":"Qatar Computing Research Institute [Doha, Qatar]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004014878","display_name":"Michael Backes","orcid":"https://orcid.org/0000-0002-9326-6400"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN","DE"],"is_corresponding":false,"raw_author_name":"Michael Backes","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","Center for It-Security, Privacy & Accountability"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]},{"raw_affiliation_string":"Center for It-Security, Privacy & Accountability","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100354571","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0001-6821-2710"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN","DE"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","Center for It-Security, Privacy & Accountability"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]},{"raw_affiliation_string":"Center for It-Security, Privacy & Accountability","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046881273","display_name":"Gianluca Stringhini","orcid":"https://orcid.org/0000-0002-6162-578X"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gianluca Stringhini","raw_affiliation_strings":["Boston University, Boston, MA, USA","University of Massachusetts [Boston]"],"affiliations":[{"raw_affiliation_string":"Boston University, Boston, MA, USA","institution_ids":[]},{"raw_affiliation_string":"University of Massachusetts [Boston]","institution_ids":["https://openalex.org/I33434090"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5050781579"],"corresponding_institution_ids":["https://openalex.org/I1283576576"],"apc_list":null,"apc_paid":null,"fwci":1.0471,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.78873165,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2643","last_page":"2657"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7771733999252319},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6855258941650391},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5771244168281555},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5709440112113953},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5360050797462463},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4987955093383789},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2675696313381195},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2285519242286682}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7771733999252319},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6855258941650391},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5771244168281555},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5709440112113953},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5360050797462463},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4987955093383789},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2675696313381195},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2285519242286682}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3548606.3559358","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559358","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:research.vu.nl:publications/31d59a56-ae11-4750-b3e1-b855f1930c17","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/31d59a56-ae11-4750-b3e1-b855f1930c17","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Shen, Y, Han, Y, Zhang, Z, Chen, M, Yu, T, Backes, M, Zhang, Y & Stringhini, G 2022, Finding MNEMON: Reviving Memories of Node Embeddings. in CCS 2022 : Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, ACM, pp. 2643-2657. https://doi.org/10.1145/3548606.3559358","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-03893484v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-03893484","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CCS 2022 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.2643-2657, &#x27E8;10.1145/3548606.3559358&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/31d59a56-ae11-4750-b3e1-b855f1930c17","is_oa":false,"landing_page_url":"https://hdl.handle.net/1871.1/31d59a56-ae11-4750-b3e1-b855f1930c17","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Shen, Y, Han, Y, Zhang, Z, Chen, M, Yu, T, Backes, M, Zhang, Y & Stringhini, G 2022, Finding MNEMON: Reviving Memories of Node Embeddings. in CCS 2022 : Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, ACM, pp. 2643-2657. https://doi.org/10.1145/3548606.3559358","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1966752340","display_name":null,"funder_award_id":"ZT-I-OO1 4","funder_id":"https://openalex.org/F4320325698","funder_display_name":"Helmholtz Association"},{"id":"https://openalex.org/G244355813","display_name":null,"funder_award_id":"CNS-2127232","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320325698","display_name":"Helmholtz Association","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1560095312","https://openalex.org/W1562618793","https://openalex.org/W1802051025","https://openalex.org/W1864134408","https://openalex.org/W1998091733","https://openalex.org/W2075709248","https://openalex.org/W2080318337","https://openalex.org/W2105250718","https://openalex.org/W2128678576","https://openalex.org/W2146008005","https://openalex.org/W2152430833","https://openalex.org/W2154851992","https://openalex.org/W2156718197","https://openalex.org/W2159675343","https://openalex.org/W2229164416","https://openalex.org/W2295124130","https://openalex.org/W2757528734","https://openalex.org/W2893249073","https://openalex.org/W2898829570","https://openalex.org/W2912213068","https://openalex.org/W2945996535","https://openalex.org/W2955308964","https://openalex.org/W2962756421","https://openalex.org/W2963224980","https://openalex.org/W2963512530","https://openalex.org/W2963539945","https://openalex.org/W2966398094","https://openalex.org/W3023153742","https://openalex.org/W3094607559","https://openalex.org/W3098742898","https://openalex.org/W3104097132","https://openalex.org/W3114326599","https://openalex.org/W3122868618","https://openalex.org/W3135590698","https://openalex.org/W3165639541","https://openalex.org/W3167334189","https://openalex.org/W3175971420","https://openalex.org/W3178835722","https://openalex.org/W3196012972","https://openalex.org/W3211930400","https://openalex.org/W4221155126","https://openalex.org/W4232932184","https://openalex.org/W4296562799","https://openalex.org/W4299337115","https://openalex.org/W6717622092"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2573831620","https://openalex.org/W2932872266"],"abstract_inverted_index":{"Previous":[0],"security":[1,19],"research":[2],"efforts":[3],"orbiting":[4],"around":[5],"graphs":[6,15],"have":[7],"been":[8,30],"exclusively":[9],"focusing":[10],"on":[11],"either":[12],"(de-)anonymizing":[13],"the":[14,18,34,39,71,78,99,104,110,116],"or":[16],"understanding":[17],"and":[20,61,118],"privacy":[21,35],"issues":[22],"of":[23,37,80,103,120],"graph":[24,42,66,73,81,106,122],"neural":[25],"networks.":[26],"Little":[27],"attention":[28],"has":[29],"paid":[31],"to":[32,98],"understand":[33],"risks":[36],"integrating":[38],"output":[40],"from":[41],"embedding":[43,101,112],"models":[44],"(e.g.,":[45],"node":[46,100,111],"embeddings)":[47],"with":[48,91,109],"complex":[49],"downstream":[50],"machine":[51],"learning":[52],"pipelines.":[53],"In":[54],"this":[55,59],"paper,":[56],"we":[57],"fill":[58],"gap":[60],"propose":[62],"a":[63],"novel":[64],"model-agnostic":[65],"recovery":[67,123],"attack":[68,124],"that":[69,85],"exploits":[70],"implicit":[72],"structural":[74],"information":[75],"preserved":[76],"in":[77],"embeddings":[79],"nodes.":[82],"We":[83,114],"show":[84],"an":[86],"adversary":[87],"can":[88],"recover":[89],"edges":[90],"decent":[92],"accuracy":[93],"by":[94],"only":[95],"gaining":[96],"access":[97],"matrix":[102],"original":[105],"without":[107],"interactions":[108],"models.":[113],"demonstrate":[115],"effectiveness":[117],"applicability":[119],"our":[121],"through":[125],"extensive":[126],"experiments.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2022-11-13T00:00:00"}
