Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks?
Yuanxin ZhuangChuan ShiMengmei ZhangJinghui ChenLingjuan LyuPan ZhouLichao SunPublished in: USENIX Security Symposium (2024)
Keyphrases
- data sets
- synthetic data
- neural network
- data collection
- data analysis
- experimental data
- database
- data structure
- input data
- image data
- probability distribution
- raw data
- data processing
- original data
- data sources
- prior knowledge
- pattern recognition
- high level
- statistical methods
- network structure
- neural network model
- missing data
- data quality
- statistical analysis
- information extraction
- knowledge discovery
- data points
- end users
- probabilistic model
- high quality
- databases