{"id":"https://openalex.org/W7138138479","doi":"https://doi.org/10.1609/aaai.v40i25.39210","title":"FedSkeleton: Secure Multi-Party Graph Skeleton Construction for Privacy-Preserving Federated Time-Series Forecasting","display_name":"FedSkeleton: Secure Multi-Party Graph Skeleton Construction for Privacy-Preserving Federated Time-Series Forecasting","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138138479","doi":"https://doi.org/10.1609/aaai.v40i25.39210"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i25.39210","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i25.39210","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/39210/43171","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/39210/43171","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116907276","display_name":"Henggang Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Henggang Deng","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129687669","display_name":"Yuchao Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchao Tang","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101741812","display_name":"Wenjie Fu","orcid":"https://orcid.org/0009-0004-9879-946X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjie Fu","raw_affiliation_strings":["Huazhong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129691601","display_name":"Huandong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huandong Wang","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129673146","display_name":"Kun Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kun Chen","raw_affiliation_strings":["Ant Group"],"affiliations":[{"raw_affiliation_string":"Ant Group","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129718434","display_name":"Tao Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jiang","raw_affiliation_strings":["Huazhong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5116907276"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.6043956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"25","first_page":"20719","last_page":"20727"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.3138999938964844,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.3138999938964844,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.2915000021457672,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.1216999962925911,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6771000027656555},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5613999962806702},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.5424000024795532},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.5343000292778015},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4580000042915344},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.40369999408721924},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4025999903678894},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3944000005722046}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8197000026702881},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6771000027656555},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5613999962806702},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.5424000024795532},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.5343000292778015},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4837999939918518},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46790000796318054},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4580000042915344},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.40369999408721924},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3944000005722046},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.36809998750686646},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.3644999861717224},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3594000041484833},{"id":"https://openalex.org/C26320393","wikidata":"https://www.wikidata.org/wiki/Q597053","display_name":"Functional dependency","level":3,"score":0.3483000099658966},{"id":"https://openalex.org/C157406716","wikidata":"https://www.wikidata.org/wiki/Q4115842","display_name":"Topological graph theory","level":5,"score":0.3246999979019165},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.31369999051094055},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3025999963283539},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i25.39210","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i25.39210","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/39210/43171","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i25.39210","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i25.39210","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/39210/43171","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4300704300403595,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320318398","display_name":"Ant Group","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7138138479.pdf","grobid_xml":"https://content.openalex.org/works/W7138138479.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,20,165],"real-world":[1],"time-series":[2,120],"modelling,":[3],"graph":[4,25,73],"structures":[5],"are":[6,94],"widely":[7],"adopted":[8],"because":[9],"they":[10],"explicitly":[11],"encode":[12],"node":[13],"topology":[14,47,74],"and":[15,128,150,174,188,196],"capture":[16,136],"complex":[17],"network":[18],"dynamics.":[19],"practice,":[21],"however,":[22],"a":[23,59,106,116,124,129,156],"complete":[24],"is":[26],"often":[27],"partitioned":[28],"across":[29],"multiple":[30],"parties;":[31],"each":[32],"party":[33],"can":[34,81],"access":[35,161],"only":[36],"its":[37],"local":[38],"sub-graph":[39],"and,":[40],"owing":[41],"to":[42,83,193],"privacy":[43,84,104],"regulations,":[44],"cannot":[45],"share":[46],"or":[48],"data,":[49],"creating":[50],"pervasive":[51],"data":[52],"silos.":[53],"Federated":[54],"Graph":[55],"Learning":[56],"(FGL)":[57],"offers":[58],"privacy-preserving":[60,117],"collaborative-learning":[61],"paradigm,":[62],"yet":[63,99],"current":[64],"methods":[65],"still":[66],"face":[67],"two":[68],"key":[69,194],"challenges:":[70],"(1)":[71],"the":[72,139,197],"itself":[75],"contains":[76],"sensitive":[77],"structural":[78],"information,":[79],"which":[80],"lead":[82],"leakage":[85],"if":[86],"directly":[87],"shared":[88],"during":[89],"FGL;":[90],"(2)":[91],"cross-party":[92],"edges":[93],"crucial":[95],"for":[96,119],"accurate":[97],"modeling,":[98],"exploiting":[100],"them":[101],"without":[102,137],"compromising":[103],"remains":[105,189],"significant":[107],"challenge.":[108],"To":[109],"overcome":[110],"these":[111],"obstacles,":[112],"we":[113,167],"propose":[114],"FedSkeleton,":[115],"framework":[118],"prediction":[121],"that":[122,144,178],"comprises":[123],"Skeleton":[125],"Construction":[126],"Module":[127],"Dual-stream":[130],"Forecasting":[131],"Module,":[132],"enabling":[133],"global":[134],"dependency":[135],"revealing":[138],"topology.":[140],"Extensive":[141],"experiments":[142],"show":[143],"FedSkeleton":[145,179],"consistently":[146],"outperforms":[147],"existing":[148],"baselines":[149],"even":[151],"surpasses":[152],"models":[153],"trained":[154],"in":[155,162],"centralized":[157],"setting":[158],"with":[159,191],"full-graph":[160],"certain":[163],"cases.":[164],"addition,":[166],"conduct":[168],"comprehensive":[169],"security":[170],"analysis,":[171],"communication-cost":[172],"evaluation":[173],"scalability":[175],"experiments,":[176],"demonstrating":[177],"effectively":[180],"resists":[181],"common":[182],"attacks,":[183],"keeps":[184],"communication":[185],"overhead":[186],"manageable,":[187],"robust":[190],"respect":[192],"hyper-parameters":[195],"number":[198],"of":[199],"participating":[200],"parties.":[201]},"counts_by_year":[],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2026-03-18T00:00:00"}
