{"id":"https://openalex.org/W4414707835","doi":"https://doi.org/10.3390/computers14100414","title":"Do LLMs Offer a Robust Defense Mechanism Against Membership Inference Attacks on Graph Neural Networks?","display_name":"Do LLMs Offer a Robust Defense Mechanism Against Membership Inference Attacks on Graph Neural Networks?","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4414707835","doi":"https://doi.org/10.3390/computers14100414"},"language":"en","primary_location":{"id":"doi:10.3390/computers14100414","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14100414","pdf_url":null,"source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/computers14100414","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023835779","display_name":"Abdellah Jnaini","orcid":"https://orcid.org/0000-0002-7506-8582"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Abdellah Jnaini","raw_affiliation_strings":["Department of Computer Science, National School of Applied Sciences, Mohammed First University, Oujda 60000, Morocco"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National School of Applied Sciences, Mohammed First University, Oujda 60000, Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028718368","display_name":"Mohammed-Amine Koulali","orcid":"https://orcid.org/0000-0003-3284-1237"},"institutions":[{"id":"https://openalex.org/I4210131560","display_name":"Universit\u00e9 Mohammed VI Polytechnique","ror":"https://ror.org/03xc55g68","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210131560"]},{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed-Amine Koulali","raw_affiliation_strings":["College of Computing, Mohammed VI Polytechnic University (UM6P), Ben Guerir 43150, Morocco","Department of Computer Science, National School of Applied Sciences, Mohammed First University, Oujda 60000, Morocco"],"affiliations":[{"raw_affiliation_string":"College of Computing, Mohammed VI Polytechnic University (UM6P), Ben Guerir 43150, Morocco","institution_ids":["https://openalex.org/I4210131560"]},{"raw_affiliation_string":"Department of Computer Science, National School of Applied Sciences, Mohammed First University, Oujda 60000, Morocco","institution_ids":["https://openalex.org/I4210108110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023835779"],"corresponding_institution_ids":["https://openalex.org/I4210108110"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14871878,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"10","first_page":"414","last_page":"414"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6851000189781189},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4514999985694885},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4323999881744385},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4196999967098236},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.36000001430511475},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.3578000068664551},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.3544999957084656},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.3391999900341034}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7700999975204468},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6851000189781189},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5956000089645386},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5318999886512756},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4514999985694885},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4323999881744385},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4196999967098236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4090999960899353},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39309999346733093},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.36000001430511475},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3578000068664551},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3391999900341034},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers14100414","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14100414","pdf_url":null,"source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:88eea1fd09ce459ebd500a4c89f8804a","is_oa":true,"landing_page_url":"https://doaj.org/article/88eea1fd09ce459ebd500a4c89f8804a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 14, Iss 10, p 414 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers14100414","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14100414","pdf_url":null,"source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1538131130","https://openalex.org/W1902237438","https://openalex.org/W2064675550","https://openalex.org/W2095705004","https://openalex.org/W2160815625","https://openalex.org/W2261059368","https://openalex.org/W2558748708","https://openalex.org/W2606665849","https://openalex.org/W2884943453","https://openalex.org/W2963037989","https://openalex.org/W2963105378","https://openalex.org/W2984323660","https://openalex.org/W2997574889","https://openalex.org/W3125963848","https://openalex.org/W4283650725","https://openalex.org/W4288057780","https://openalex.org/W4292696974","https://openalex.org/W4308642595","https://openalex.org/W4308644392","https://openalex.org/W4312067215","https://openalex.org/W4312228673","https://openalex.org/W4379468629","https://openalex.org/W4385522595","https://openalex.org/W4387831926","https://openalex.org/W4389279172","https://openalex.org/W4393034172"],"related_works":[],"abstract_inverted_index":{"Graph":[0],"neural":[1],"networks":[2],"(GNNs)":[3],"are":[4,68],"deep":[5],"learning":[6],"models":[7],"that":[8,88],"process":[9],"structured":[10],"graph":[11],"data.":[12],"By":[13],"leveraging":[14],"their":[15],"graphs/node":[16],"classification":[17,144],"and":[18,37,43,64,123],"link":[19],"prediction":[20],"capabilities,":[21],"they":[22],"have":[23,52],"been":[24],"effectively":[25],"applied":[26,112],"in":[27,49,58],"multiple":[28],"domains":[29],"such":[30],"as":[31],"community":[32],"detection,":[33],"location":[34],"sharing":[35],"services,":[36],"drug":[38],"discovery.":[39],"These":[40],"powerful":[41],"applications":[42],"the":[44,54,71,90,100,114,138,142],"vast":[45],"availability":[46],"of":[47,56,73],"graphs":[48],"diverse":[50],"fields":[51],"facilitated":[53],"adoption":[55],"GNNs":[57,67],"privacy-sensitive":[59],"contexts":[60],"(e.g.,":[61],"banking":[62],"systems":[63],"healthcare).":[65],"Unfortunately,":[66],"vulnerable":[69],"to":[70,92,99],"leakage":[72],"sensitive":[74],"information":[75],"through":[76,149],"well-defined":[77],"attacks.":[78],"Our":[79,126,146],"main":[80],"focus":[81],"is":[82],"on":[83,141,152],"membership":[84],"inference":[85],"attacks":[86],"(MIAs)":[87],"allow":[89],"attacker":[91],"infer":[93],"whether":[94],"a":[95],"given":[96],"sample":[97],"belongs":[98],"training":[101],"dataset.":[102],"To":[103],"prevent":[104],"this,":[105],"we":[106],"introduce":[107],"three":[108],"LLM-guided":[109],"defense":[110],"mechanisms":[111],"at":[113],"posterior":[115,117],"level:":[116],"encoding":[118],"with":[119,163],"noise,":[120],"knowledge":[121],"distillation,":[122],"secure":[124],"aggregation.":[125],"proposed":[127],"approaches":[128],"not":[129],"only":[130],"successfully":[131],"reduce":[132],"MIA":[133],"accuracy":[134],"but":[135],"also":[136],"maintain":[137],"model\u2019s":[139],"performance":[140],"node":[143],"task.":[145],"findings,":[147],"validated":[148],"extensive":[150],"experiments":[151],"widely":[153],"used":[154],"GNN":[155],"architectures,":[156],"offer":[157],"insights":[158],"into":[159],"balancing":[160],"privacy":[161],"preservation":[162],"predictive":[164],"performance.":[165]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
