Model inversion attacks against graph neural networks

Z Zhang, Q Liu, Z Huang, H Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many data mining tasks rely on graphs to model relational structures among individuals
(nodes). Since relational data are often sensitive, there is an urgent need to evaluate the …

Graphmi: Extracting private graph data from graph neural networks

Z Zhang, Q Liu, Z Huang, H Wang, C Lu, C Liu… - arXiv preprint arXiv …, 2021 - arxiv.org
As machine learning becomes more widely used for critical applications, the need to study
its implications in privacy turns to be urgent. Given access to the target model and auxiliary …

Node-level membership inference attacks against graph neural networks

X He, R Wen, Y Wu, M Backes, Y Shen… - arXiv preprint arXiv …, 2021 - arxiv.org
Many real-world data comes in the form of graphs, such as social networks and protein
structure. To fully utilize the information contained in graph data, a new family of machine …

Group property inference attacks against graph neural networks

X Wang, WH Wang - Proceedings of the 2022 ACM SIGSAC Conference …, 2022 - dl.acm.org
Recent research has shown that machine learning (ML) models are vulnerable to privacy
attacks that leak information about the training data. In this work, we consider Graph Neural …

A unified framework of graph information bottleneck for robustness and membership privacy

E Dai, L Cui, Z Wang, X Tang, Y Wang… - Proceedings of the 29th …, 2023 - dl.acm.org
Graph Neural Networks (GNNs) have achieved great success in modeling graph-structured
data. However, recent works show that GNNs are vulnerable to adversarial attacks which …

Quantifying privacy leakage in graph embedding

V Duddu, A Boutet, V Shejwalkar - MobiQuitous 2020-17th EAI …, 2020 - dl.acm.org
Graph embeddings have been proposed to map graph data to low dimensional space for
downstream processing (eg, node classification or link prediction). With the increasing …

A survey on privacy in graph neural networks: Attacks, preservation, and applications

Y Zhang, Y Zhao, Z Li, X Cheng, Y Wang… - … on Knowledge and …, 2024 - ieeexplore.ieee.org
Graph Neural Networks (GNNs) have gained significant attention owing to their ability to
handle graph-structured data and the improvement in practical applications. However, many …

Efficient, direct, and restricted black-box graph evasion attacks to any-layer graph neural networks via influence function

B Wang, M Lin, T Zhou, P Zhou, A Li, M Pang… - Proceedings of the 17th …, 2024 - dl.acm.org
Graph neural network (GNN), the mainstream method to learn on graph data, is vulnerable
to graph evasion attacks, where an attacker slightly perturbing the graph structure can fool …

Membership inference attack on graph neural networks

IE Olatunji, W Nejdl, M Khosla - 2021 Third IEEE International …, 2021 - ieeexplore.ieee.org
Graph Neural Networks (GNNs), which generalize traditional deep neural networks on
graph data, have achieved state-of-the-art performance on several graph analytical tasks …

Demystifying uneven vulnerability of link stealing attacks against graph neural networks

H Zhang, B Wu, S Wang, X Yang… - International …, 2023 - proceedings.mlr.press
While graph neural networks (GNNs) dominate the state-of-the-art for exploring graphs in
real-world applications, they have been shown to be vulnerable to a growing number of …