{"id":"https://openalex.org/W4414360025","doi":"https://doi.org/10.24963/ijcai.2025/375","title":"An Out-Of-Distribution Membership Inference Attack Approach for Cross-Domain Graph Attacks","display_name":"An Out-Of-Distribution Membership Inference Attack Approach for Cross-Domain Graph Attacks","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414360025","doi":"https://doi.org/10.24963/ijcai.2025/375"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/375","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100639422","display_name":"Jinyan Wang","orcid":"https://orcid.org/0000-0001-9385-9903"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyan Wang","raw_affiliation_strings":["Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100356160","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0003-3761-0104"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Yang","raw_affiliation_strings":["Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004453563","display_name":"Yuecen Wei","orcid":"https://orcid.org/0000-0002-0218-948X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuecen Wei","raw_affiliation_strings":["Beihang University"],"affiliations":[{"raw_affiliation_string":"Beihang University","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087133473","display_name":"Jiaxuan Si","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaxuan Si","raw_affiliation_strings":["Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026717985","display_name":"Chenhao Guo","orcid":"https://orcid.org/0000-0001-7125-6191"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenhao Guo","raw_affiliation_strings":["Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018132697","display_name":"Qingyun Sun","orcid":"https://orcid.org/0000-0003-1930-3848"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyun Sun","raw_affiliation_strings":["Beihang University"],"affiliations":[{"raw_affiliation_string":"Beihang University","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037037839","display_name":"Xianxian Li","orcid":"https://orcid.org/0000-0002-7083-3847"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianxian Li","raw_affiliation_strings":["Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044043709","display_name":"Xingcheng Fu","orcid":"https://orcid.org/0000-0002-4643-8126"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingcheng Fu","raw_affiliation_strings":["Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100639422"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35006803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3371","last_page":"3379"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9696999788284302,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6729000210762024},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.49230000376701355},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.4810999929904938},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.4327000081539154},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.3783000111579895},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.3190999925136566},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.2921000123023987}],"concepts":[{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6729000210762024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6610000133514404},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.49230000376701355},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.4810999929904938},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4498000144958496},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.4327000081539154},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4027999937534332},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3783000111579895},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31150001287460327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30390000343322754},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C132459708","wikidata":"https://www.wikidata.org/wiki/Q744069","display_name":"Extrapolation","level":2,"score":0.28929999470710754},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.28929999470710754},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.2549000084400177},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/375","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Graph":[0,92],"Neural":[1],"Network-based":[2],"methods":[3],"face":[4],"privacy":[5,45],"leakage":[6],"risks":[7],"due":[8],"to":[9,21,98,113,146,172,181,185],"the":[10,16,23,28,41,48,62,75,115,123,151,174,183],"introduction":[11],"of":[12,27,50,117,153],"topological":[13],"structures":[14],"about":[15],"targets,":[17],"which":[18,52],"allows":[19],"attackers":[20,55],"bypass":[22],"target's":[24],"prior":[25],"knowledge":[26],"sensitive":[29],"attributes":[30],"and":[31,39,88,133,141,156],"realize":[32],"membership":[33],"inference":[34,180],"attacks":[35,165],"(MIA)":[36],"by":[37],"observing":[38],"analyzing":[40],"topology":[42],"distribution.":[43],"As":[44],"concerns":[46],"grow,":[47],"assumption":[49],"MIA,":[51],"presumes":[53],"that":[54,127,191],"can":[56],"obtain":[57],"an":[58,84],"auxiliary":[59],"dataset":[60],"with":[61,108],"same":[63],"distribution,":[64],"is":[65],"increasingly":[66],"deviating":[67],"from":[68,110,138],"reality.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73,104,168],"categorize":[74],"distribution":[76],"diversity":[77,116],"issue":[78],"in":[79,197],"real-world":[80,118],"MIA":[81],"scenarios":[82],"as":[83],"Out-Of-Distribution":[85],"(OOD)":[86],"problem,":[87],"propose":[89],"a":[90],"novel":[91],"OOD":[93],"Membership":[94],"Inference":[95],"Attack":[96],"(GOOD-MIA)":[97],"achieve":[99],"cross-domain":[100,163],"graph":[101,164],"attacks.":[102],"Specifically,":[103],"construct":[105],"shadow":[106],"subgraphs":[107],"distributions":[109],"different":[111],"domains":[112],"model":[114],"data.":[119,158],"We":[120],"then":[121],"explore":[122],"stable":[124],"node":[125],"representations":[126],"remain":[128],"unchanged":[129],"under":[130],"external":[131],"influences":[132],"consider":[134],"eliminating":[135],"redundant":[136],"information":[137,145],"confounding":[139],"environments":[140],"extracting":[142],"task-relevant":[143],"key":[144],"more":[147],"clearly":[148],"distinguish":[149],"between":[150],"characteristics":[152],"training":[154],"data":[155],"unseen":[157],"This":[159],"OOD-based":[160],"design":[161],"makes":[162],"possible.":[166],"Finally,":[167],"perform":[169],"risk":[170],"extrapolation":[171],"optimize":[173],"attack's":[175],"domain":[176],"adaptability":[177],"during":[178],"attack":[179,184,195],"generalize":[182],"other":[186],"domains.":[187,202],"Experimental":[188],"results":[189],"demonstrate":[190],"GOOD-MIA":[192],"achieves":[193],"superior":[194],"performance":[196],"datasets":[198],"designed":[199],"for":[200],"multiple":[201]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
