{"id":"https://openalex.org/W4387849068","doi":"https://doi.org/10.1145/3583780.3615104","title":"Unveiling the Role of Message Passing in Dual-Privacy Preservation on GNNs","display_name":"Unveiling the Role of Message Passing in Dual-Privacy Preservation on GNNs","publication_year":2023,"publication_date":"2023-10-21","ids":{"openalex":"https://openalex.org/W4387849068","doi":"https://doi.org/10.1145/3583780.3615104"},"language":"en","primary_location":{"id":"doi:10.1145/3583780.3615104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583780.3615104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102725913","display_name":"Tianyi Zhao","orcid":"https://orcid.org/0009-0005-5239-9871"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tianyi Zhao","raw_affiliation_strings":["University of Southern California, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004539398","display_name":"Hui Li Yinghui Hu","orcid":"https://orcid.org/0000-0001-6064-1369"},"institutions":[{"id":"https://openalex.org/I12834331","display_name":"University of Wyoming","ror":"https://ror.org/01485tq96","country_code":"US","type":"education","lineage":["https://openalex.org/I12834331"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hui Hu","raw_affiliation_strings":["Wyoming University, Larami, WY, USA"],"affiliations":[{"raw_affiliation_string":"Wyoming University, Larami, WY, USA","institution_ids":["https://openalex.org/I12834331"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040552536","display_name":"Lu Cheng","orcid":"https://orcid.org/0000-0002-2503-2522"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lu Cheng","raw_affiliation_strings":["University of Illinois Chicago, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois Chicago, Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102725913"],"corresponding_institution_ids":["https://openalex.org/I1174212"],"apc_list":null,"apc_paid":null,"fwci":0.5245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72039771,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"3474","last_page":"3483"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8718091249465942},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6103981137275696},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5970878601074219},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5110296010971069},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4505395293235779},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45023757219314575},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4227636456489563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38964542746543884},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34130847454071045},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2611997127532959}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8718091249465942},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6103981137275696},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5970878601074219},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5110296010971069},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4505395293235779},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45023757219314575},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4227636456489563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38964542746543884},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34130847454071045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2611997127532959},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3583780.3615104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583780.3615104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W385466589","https://openalex.org/W2478722229","https://openalex.org/W2535690855","https://openalex.org/W2809206206","https://openalex.org/W2914982603","https://openalex.org/W2969695741","https://openalex.org/W2971323980","https://openalex.org/W2993016614","https://openalex.org/W2997378229","https://openalex.org/W3012562343","https://openalex.org/W3093814892","https://openalex.org/W3095461782","https://openalex.org/W3100646853","https://openalex.org/W3125963848","https://openalex.org/W3189076644","https://openalex.org/W3190469032","https://openalex.org/W3196012972","https://openalex.org/W3198760712","https://openalex.org/W3206855510","https://openalex.org/W4224312467","https://openalex.org/W4291414318","https://openalex.org/W4318969637"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W4308699695","https://openalex.org/W2030205047","https://openalex.org/W2801655275"],"abstract_inverted_index":{"Graph":[0],"Neural":[1],"Networks":[2],"(GNNs)":[3],"are":[4],"powerful":[5],"tools":[6],"for":[7,171],"learning":[8],"representations":[9],"on":[10,40,149],"graphs,":[11],"such":[12,174],"as":[13,72,105,175],"social":[14],"networks.":[15],"However,":[16],"their":[17,24],"vulnerability":[18],"to":[19,57,79,104],"privacy":[20,58,82,166],"inference":[21],"attacks":[22],"restricts":[23],"practicality,":[25],"especially":[26],"in":[27,160],"high-stake":[28],"domains.":[29],"To":[30],"address":[31],"this":[32],"issue,":[33],"privacy-preserving":[34,92],"GNNs":[35,55,78],"have":[36],"been":[37],"proposed,":[38],"focusing":[39],"preserving":[41,168],"node":[42,99,124,163,176],"and/or":[43],"link":[44,101,165],"privacy.":[45],"This":[46],"work":[47],"takes":[48],"a":[49,90,114,126],"step":[50],"back":[51],"and":[52,63,100,137,164],"investigates":[53],"how":[54],"contribute":[56],"leakage.":[59,83],"Through":[60],"theoretical":[61],"analysis":[62],"simulations,":[64],"we":[65,88],"identify":[66],"message":[67],"passing":[68],"under":[69],"structural":[70,135],"bias":[71],"the":[73,134,144,154,157],"core":[74],"component":[75],"that":[76,95,119,131,142],"allows":[77],"propagate":[80],"andamplify":[81],"Building":[84],"upon":[85],"these":[86],"findings,":[87],"propose":[89],"principled":[91],"GNN":[93],"framework":[94,109],"effectively":[96],"safeguards":[97],"both":[98,162],"privacy,":[102],"referred":[103],"dual-privacy":[106],"preservation.":[107],"The":[108],"comprises":[110],"three":[111],"major":[112],"modules:":[113],"Sensitive":[115],"Information":[116],"Obfuscation":[117],"Module":[118,130,141],"removes":[120],"sensitive":[121],"information":[122],"from":[123],"embeddings,":[125],"Dynamic":[127],"Structure":[128],"Debiasing":[129],"dynamically":[132],"corrects":[133],"bias,":[136],"an":[138],"Adversarial":[139],"Learning":[140],"optimizes":[143],"privacy-utility":[145],"trade-off.":[146],"Experimental":[147],"results":[148],"four":[150],"benchmark":[151],"datasets":[152],"validate":[153],"effectiveness":[155],"of":[156],"proposed":[158],"model":[159],"protecting":[161],"while":[167],"high":[169],"utility":[170],"downstream":[172],"tasks,":[173],"classification.":[177]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
