{"id":"https://openalex.org/W4400381562","doi":"https://doi.org/10.56553/popets-2024-0143","title":"Link Stealing Attacks Against Inductive Graph Neural Networks","display_name":"Link Stealing Attacks Against Inductive Graph Neural Networks","publication_year":2024,"publication_date":"2024-07-06","ids":{"openalex":"https://openalex.org/W4400381562","doi":"https://doi.org/10.56553/popets-2024-0143"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2024-0143","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2024-0143","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0143.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2024/popets-2024-0143.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102863764","display_name":"Yixin Wu","orcid":"https://orcid.org/0000-0002-3000-9423"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Yixin Wu","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074889369","display_name":"Xinlei He","orcid":"https://orcid.org/0000-0002-1526-6341"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xinlei He","raw_affiliation_strings":["Hong Kong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012185727","display_name":"Pascal Berrang","orcid":"https://orcid.org/0000-0002-9194-9603"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pascal Berrang","raw_affiliation_strings":["University of Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Birmingham","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053332520","display_name":"Mathias Humbert","orcid":"https://orcid.org/0000-0001-5046-1727"},"institutions":[{"id":"https://openalex.org/I97565354","display_name":"University of Lausanne","ror":"https://ror.org/019whta54","country_code":"CH","type":"education","lineage":["https://openalex.org/I97565354"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Mathias Humbert","raw_affiliation_strings":["University of Lausanne"],"affiliations":[{"raw_affiliation_string":"University of Lausanne","institution_ids":["https://openalex.org/I97565354"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004014878","display_name":"Michael Backes","orcid":"https://orcid.org/0000-0002-9326-6400"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Backes","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009102659","display_name":"Neil Zhenqiang Gong","orcid":"https://orcid.org/0000-0002-9900-9309"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neil Zhenqiang Gong","raw_affiliation_strings":["Duke University"],"affiliations":[{"raw_affiliation_string":"Duke University","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108052724","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0001-6809-0696"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security","institution_ids":["https://openalex.org/I4210128801"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102863764"],"corresponding_institution_ids":["https://openalex.org/I4210128801"],"apc_list":null,"apc_paid":null,"fwci":1.4367,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8426074,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2024","issue":"4","first_page":"818","last_page":"839"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6884768009185791},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48451417684555054},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4435790181159973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4102017283439636},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35652148723602295},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2931917905807495},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2514934539794922}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6884768009185791},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48451417684555054},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4435790181159973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4102017283439636},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35652148723602295},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2931917905807495},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2514934539794922}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.56553/popets-2024-0143","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2024-0143","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0143.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:iris.unil.ch:iris/187232","is_oa":true,"landing_page_url":"https://iris.unil.ch/handle/iris/187232","pdf_url":"https://iris.unil.ch/bitstreams/ce936eb3-22f1-4a33-a0e3-f6c498f4ed26/download","source":{"id":"https://openalex.org/S7407055444","display_name":"IRIS","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"},{"id":"pmh:oai:pure.atira.dk:publications/b8846736-f4fd-4369-b37b-e5c250d39a87","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/b8846736-f4fd-4369-b37b-e5c250d39a87","pdf_url":"https://pure-oai.bham.ac.uk/ws/files/240989938/WuY2024Link.pdf","source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wu, Y, He, X, Berrang, P, Humbert, M, Backes, M, Gong, N & Zhang, Y 2024, 'Link Stealing Attacks Against Inductive Graph Neural Networks', PoPETs, vol. 2024, no. 4, pp. 818\u2013839. https://doi.org/10.56553/popets-2024-0143","raw_type":"article"},{"id":"pmh:oai:serval.unil.ch:BIB_748C8EFE1E2F","is_oa":true,"landing_page_url":"https://serval.unil.ch/notice/serval:BIB_748C8EFE1E2F","pdf_url":"https://serval.unil.ch/resource/serval:BIB_748C8EFE1E2F.P001/REF.pdf","source":{"id":"https://openalex.org/S4306401797","display_name":"SERVAL (Universit\u00e9 de Lausanne)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210093590","host_organization_name":"Swiss School of Archaeology in Greece","host_organization_lineage":["https://openalex.org/I4210093590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, vol. 2024, no. 4, pp. 818-839","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.56553/popets-2024-0143","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2024-0143","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0143.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400381562.pdf","grobid_xml":"https://content.openalex.org/works/W4400381562.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1821462560","https://openalex.org/W2027731328","https://openalex.org/W2107933610","https://openalex.org/W2153959628","https://openalex.org/W2526910689","https://openalex.org/W2535690855","https://openalex.org/W2574817444","https://openalex.org/W2771035597","https://openalex.org/W2891130331","https://openalex.org/W2914953695","https://openalex.org/W2946297661","https://openalex.org/W2952085278","https://openalex.org/W2962711740","https://openalex.org/W2963378725","https://openalex.org/W2964015378","https://openalex.org/W2964283260","https://openalex.org/W2964583308","https://openalex.org/W2964971928","https://openalex.org/W2966149470","https://openalex.org/W2984488829","https://openalex.org/W2996295940","https://openalex.org/W2998496395","https://openalex.org/W3022536969","https://openalex.org/W3042448193","https://openalex.org/W3048684575","https://openalex.org/W3094504436","https://openalex.org/W3094559034","https://openalex.org/W3099608705","https://openalex.org/W3105626348","https://openalex.org/W3125963848","https://openalex.org/W3126787694","https://openalex.org/W3167334189","https://openalex.org/W3189551349","https://openalex.org/W3204085787","https://openalex.org/W3206855510","https://openalex.org/W4221155126","https://openalex.org/W4232932184","https://openalex.org/W4294558607","https://openalex.org/W4297571622","https://openalex.org/W4297733535","https://openalex.org/W4320927527","https://openalex.org/W4385963758"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"A":[0],"graph":[1,172,201,220],"neural":[2,9],"network":[3,10],"(GNN)":[4],"is":[5,12,76,109],"a":[6,95,101,119,223],"type":[7],"of":[8,47,97,105,123,129,137,151,167],"that":[11,49,89,181,187,209],"specifically":[13],"designed":[14],"to":[15,66,70,94,157,214],"process":[16],"graph-structured":[17],"data.":[18],"Typically,":[19],"GNNs":[20,91,125,183],"can":[21,42,63,203],"be":[22,64,204],"implemented":[23],"in":[24],"two":[25,135,227],"settings,":[26],"including":[27],"the":[28,32,36,39,45,53,57,60,73,77,83,115,127,152,161],"transductive":[29,37,90],"setting":[30,75,81],"and":[31,144,160,171,218,230],"inductive":[33,58,74,106,124,182],"setting.":[34],"In":[35,56],"setting,":[38,59],"trained":[40,61],"model":[41,62],"only":[43],"predict":[44],"labels":[46],"nodes":[48],"were":[50],"observed":[51],"at":[52,82],"training":[54],"time.":[55],"generalized":[65],"new":[67],"nodes/graphs.":[68],"Due":[69],"its":[71],"flexibility,":[72],"most":[78],"popular":[79],"GNN":[80,107],"moment.":[84],"Previous":[85],"work":[86],"has":[87],"shown":[88],"are":[92,212,233],"vulnerable":[93],"series":[96],"privacy":[98,103,121],"attacks.":[99,132,146],"However,":[100],"comprehensive":[102],"analysis":[104,122],"models":[108,150],"still":[110],"missing.":[111],"This":[112],"paper":[113],"fills":[114],"gap":[116],"by":[117,164],"conducting":[118],"systematic":[120],"through":[126],"lens":[128],"link":[130,138,189],"stealing":[131,139,190],"We":[133,147,206],"propose":[134],"types":[136],"attacks,":[140,237],"i.e.,":[141],"posterior-only":[142,153],"attacks":[143,154,163,191,196,211],"combined":[145,162],"define":[148],"threat":[149],"with":[155,192,197],"respect":[156],"node":[158,169,216],"topology":[159],"considering":[165],"combinations":[166],"posteriors,":[168],"attributes,":[170],"features.":[173,221],"Extensive":[174],"evaluation":[175],"on":[176],"six":[177],"real-world":[178],"datasets":[179],"demonstrates":[180],"leak":[184],"rich":[185],"information":[186],"enables":[188],"advantageous":[193],"properties.":[194],"Even":[195],"no":[198],"knowledge":[199],"about":[200],"structures":[202],"effective.":[205],"also":[207],"show":[208],"our":[210,236],"robust":[213],"different":[215,219],"similarities":[217],"As":[222],"counterpart,":[224],"we":[225],"investigate":[226],"possible":[228],"defenses":[229],"discover":[231],"they":[232],"ineffective":[234],"against":[235],"which":[238],"calls":[239],"for":[240],"more":[241],"effective":[242],"defenses.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
