Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Lingshuo MengYijie BaiYanjiao ChenYutong HuWenyuan XuHaiqin WengPublished in: CCS (2023)
Keyphrases
- neural network
- privacy concerns
- data privacy
- privacy preserving
- graph representation
- pattern recognition
- personal information
- directed graph
- artificial neural networks
- sensitive information
- random walk
- graph theoretic
- statistical databases
- graph model
- graph theory
- bipartite graph
- graph matching
- neural network model
- privacy preserving data mining
- privacy preservation
- fuzzy logic
- private data
- graph structure
- directed acyclic graph
- associative memory
- structured data
- back propagation
- semi supervised
- spanning tree
- activation function
- recurrent neural networks
- security issues
- multilayer perceptron
- social networking
- peer to peer
- differential privacy
- graph based algorithm
- location privacy
- privacy enhancing