2020
DOI: 10.48550/arxiv.2005.02131
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Stealing Links from Graph Neural Networks

Abstract: Graph data, such as social networks and chemical networks, contains a wealth of information that can help to build powerful applications. To fully unleash the power of graph data, a family of machine learning models, namely graph neural networks (GNNs), is introduced. Empirical results show that GNNs have achieved state-of-the-art performance in various tasks.Graph data is the key to the success of GNNs. Highquality graph is expensive to collect and often contains sensitive information, such as social relation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 71 publications
(68 reference statements)
0
3
0
Order By: Relevance
“…The attacker can reconstruct the target graph by crawling these public information [2,4]. They can also utilize some graph structure reconstruction methods [11,19] to obtain this knowledge. Shadow Dataset 𝐺 ′ = (𝑉 ′ , 𝐸 ′ , 𝑋 ′ ).…”
Section: Attack Taxonomymentioning
confidence: 99%
See 2 more Smart Citations
“…The attacker can reconstruct the target graph by crawling these public information [2,4]. They can also utilize some graph structure reconstruction methods [11,19] to obtain this knowledge. Shadow Dataset 𝐺 ′ = (𝑉 ′ , 𝐸 ′ , 𝑋 ′ ).…”
Section: Attack Taxonomymentioning
confidence: 99%
“…train their model based on the sub-graph in an extensive network. We assume the attacker may also have this privilege for another sub-graph as prior attack settings [15,19,36].…”
Section: Attack Taxonomymentioning
confidence: 99%
See 1 more Smart Citation