X. Pei, X. Deng, S. Tian, J. Liu and K. Xue, "Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 1614-1629, 2024, doi: 10.1109/TIFS.2023.3329971. (CCF A类)
Hits:
Release time:2024-03-13
Journal:IEEE Transactions on Information Forensics and Security
Abstract:Abstract: With the ever-growing interest in modeling complex graph structures, graph neural networks (GNN) provide a generalized form of exploiting non-Euclidean space data. However, the global graph may be distributed across multiple data centers, which makes conventional graph-based models incapable of modeling a complete graph structure. This also brings an unprecedented challenge to user privacy protection in distributed graph learning. Due to privacy requirements of legal policies, existing graph-based solutions are difficult to deploy in practice. In this paper, we propose a privacy-preserving graph neural network based on local graph augmentation, named LGA-PGNN, which preserves user privacy by enforcing local differential privacy (LDP) noise into the decentralized local graphs held by different data holders. Moreover, we perform local neighborhood augmentation on low-degree vertices to enhance the expressiveness of the learned model. Specifically, we propose two graph privacy attacks, namely attribute inference attack and link stealing attack, which aim at compromising user privacy. The experimental results demonstrate that LGA-PGNN can effectively mitigate these two attacks and provably avoid potential privacy leakage while ensuring the utility of the learning model.
Note:http://faculty.csu.edu.cn/dengxiaoheng/zh_CN/lwcg/10445/content/49307.htm
Translation or Not:no
-
Attachments:
-
2-Privacy-Enhanced_Graph_Neural_Network_for_Decentralized_Local_Graphs.pdf
Pre One:Zijian Liu, Xiaoheng Deng, Ping Jiang, Conghao Lv, et al. Edge Perception Camouflaged Object Detection under Frequency Domain Reconstruction[J]. IEEE Transactions on Circuits and Systems for Video Technology,,DOI: 10.1109/TCSVT.2024.3404005 , 2024
Next One:X. Deng, H. Tang, X. Pei, D. Li and K. Xue, "MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5950-5963, 2023, doi: 10.1109/TIFS.2023.3318947. (CCF A类)
|
Postal Address:8d6e5f159904516b64e4092b5baa5f61e0469444b1d12af19a4b3b1583ca5d1e1d4f5aa7f7de7db96baa1b340627c69c8827f184349db54eabf8bda368ff7bfa30235a3fab0dfc9651004c10185cf328ad409c189543868f07b5b3f890615dd96f3bfde92e77ecc76d1ad428d32adb64d2e4d4d55ec7273707b01f54b5ad33a2
Email:1cf0901cf1c5deeee2603089a14ec3d52f2cb2ae56a8437b0dca49488e08adf1359460f3d8665198bf217dda36eee161cf321dc6b7ce3a57e9307a9579c4c46a3b453ad5c63112dfbc1607c0da31bec1bf63cf5b96f2e5266c9e8533fdd4937ea4cfc98ca79c6c8538cea46b510850fdf956191ab2035fbd5f4a480ca6017800
|