{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T12:10:02Z","timestamp":1750939802201,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615278"},{"type":"electronic","value":"9789819615285"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1528-5_1","type":"book-chapter","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T17:23:18Z","timestamp":1739553798000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Updates Leakage Attack Against Private Graph Split Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1274-4325","authenticated-orcid":false,"given":"Hao","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6023-2864","authenticated-orcid":false,"given":"Zhuo","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6276-1468","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0159-0594","authenticated-orcid":false,"given":"Xinjing","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1871-6037","authenticated-orcid":false,"given":"Beiwei","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4251-1143","authenticated-orcid":false,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"1_CR1","unstructured":"Amazon AWS. https:\/\/aws.amazon.com"},{"key":"1_CR2","unstructured":"Microsoft Azure. https:\/\/azure.microsoft.com\/en-us"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Humbert, M., Pang, J., Zhang, Y.: walk2friends: inferring social links from mobility profiles. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1943\u20131957 (2017)","DOI":"10.1145\/3133956.3133972"},{"key":"1_CR4","unstructured":"Bhardwaj, R., et al.: Ekya: continuous learning of video analytics models on edge compute servers. In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2022), pp. 119\u2013135. USENIX Association, Renton, WA (2022)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Ding, R., Duan, S., Xu, X., Fei, Y.: Vertexserum: poisoning graph neural networks for link inference. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 4532\u20134541. IEEE, Piscataway, NJ (2023)","DOI":"10.1109\/ICCV51070.2023.00418"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Duddu, V., Boutet, A., Shejwalkar, V.: Quantifying privacy leakage in graph embedding. In: MobiQuitous 2020-17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 76\u201385 (2020)","DOI":"10.1145\/3448891.3448939"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Gallicchio, C., Micheli, A.: Fast and deep graph neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 04, pp. 3898\u20133905. AAAI Press, Palo Alto, California USA (2020)","DOI":"10.1609\/aaai.v34i04.5803"},{"key":"1_CR8","unstructured":"Gao, X., Zhang, L.: PCAT: functionality and data stealing from split learning by Pseudo-Client attack. In: 32nd USENIX Security Symposium (USENIX Security 2023), pp. 5271\u20135288. USENIX Association, Anaheim, CA (2023)"},{"key":"1_CR9","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"1_CR10","unstructured":"He, X., Jia, J., Backes, M., Gong, N.Z., Zhang, Y.: Stealing links from graph neural networks. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 2669\u20132686. USENIX Association, Vancouver, B.C., Canada (2021)"},{"key":"1_CR11","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: International Conference on Learning Representations (2016)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Knoke, D., Yang, S.: Social Network Analysis. SAGE Publications (2019)","DOI":"10.4135\/9781506389332"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Lee, H., Yoo, S., Lee, D., Kim, J.: How important is periodic model update in recommender system? In: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 2661\u20132668. Association for Computing Machinery, New York, NY, USA (2023)","DOI":"10.1145\/3539618.3591934"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Li, K., et al.: Towards practical edge inference attacks against graph neural networks. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10096675"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Z., Fang, Y., Liu, C., Hoi, S.C.: Relative and absolute location embedding for few-shot node classification on graph. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035,5, pp. 4267\u20134275. AAAI, Menlo Park (2021)","DOI":"10.1609\/aaai.v35i5.16551"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"McAuley, J., Targett, C., Shi, Q., Van Den\u00a0Hengel, A.: Image-based recommendations on styles and substitutes. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 43\u201352. Association for Computing Machinery, New York, NY, USA (2015)","DOI":"10.1145\/2766462.2767755"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 29\u201342. Association for Computing Machinery, New York, NY, USA (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Nelson, Q., Steffensmeier, D., Pawaskar, S.: A simple approach for sustainable transportation systems in smart cities: a graph theory model. In: 2018 IEEE Conference on Technologies for Sustainability (SusTech), pp.\u00a01\u20135. IEEE, Piscataway, NJ (2018)","DOI":"10.1109\/SusTech.2018.8671384"},{"key":"1_CR19","unstructured":"Salem, A., Bhattacharya, A., Backes, M., Fritz, M., Zhang, Y.: $$\\{$$Updates-Leak$$\\}$$: data set inference and reconstruction attacks in online learning. In: 29th USENIX security symposium (USENIX Security 2020), pp. 1291\u20131308. Association for Computing Machinery, New York, NY, USA (2020)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Shen, Y., He, X., Han, Y., Zhang, Y.: Model stealing attacks against inductive graph neural networks. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1175\u20131192. IEEE, Piscataway, NJ (2022)","DOI":"10.1109\/SP46214.2022.9833607"},{"key":"1_CR21","unstructured":"Sima, C., et\u00a0al.: Ekko: a $$\\{$$Large-Scale$$\\}$$ deep learning recommender system with $$\\{$$Low-Latency$$\\}$$ model update. In: 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2022), pp. 821\u2013839. USENIX Association, Carlsbad, CA (2022)"},{"issue":"5","key":"1_CR22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.056104","volume":"67","author":"A V\u00e1zquez","year":"2003","unstructured":"V\u00e1zquez, A.: Growing network with local rules: preferential attachment, clustering hierarchy, and degree correlations. Phys. Rev. E 67(5), 056104 (2003)","journal-title":"Phys. Rev. E"},{"key":"1_CR23","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. In: International Conference on Learning Representations (2018)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-93040-4_18","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"W Wang","year":"2018","unstructured":"Wang, W., Liu, X., Jiao, P., Chen, X., Jin, D.: A unified weakly supervised framework for community detection and semantic matching. In: Phung, D., Tseng, V.S., Webb, G.I., Ho, B., Ganji, M., Rashidi, L. (eds.) PAKDD 2018. LNCS (LNAI), vol. 10939, pp. 218\u2013230. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93040-4_18"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Heterogeneous graph attention network. In: The World Wide Web Conference, pp. 2022\u20132032. Association for Computing Machinery, New York, NY, USA (2019)","DOI":"10.1145\/3308558.3313562"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Wang, X., Wang, W.H.: Group property inference attacks against graph neural networks. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2871\u20132884. Association for Computing Machinery, New York, NY, USA (2022)","DOI":"10.1145\/3548606.3560662"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Wu, B., Yang, X., Pan, S., Yuan, X.: Model extraction attacks on graph neural networks: taxonomy and realisation. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 337\u2013350. Association for Computing Machinery, New York, NY, USA (2022)","DOI":"10.1145\/3488932.3497753"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Wu, F., Long, Y., Zhang, C., Li, B.: Linkteller: recovering private edges from graph neural networks via influence analysis. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 2005\u20132024. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833806"},{"issue":"1","key":"1_CR29","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Networks Learn. Syst. 32(1), 4\u201324 (2020)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"1_CR30","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? In: International Conference on Learning Representations (2018)"},{"key":"1_CR31","unstructured":"Xu, X., Lyu, L., Dong, Y., Lu, Y., Wang, W., Jin, H.: Splitgnn: splitting GNN for node classification with heterogeneous attention. arXiv preprint arXiv:2301.12885 (2023)"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Yin, Y., et al.: Ginver: generative model inversion attacks against collaborative inference. In: Proceedings of the ACM Web Conference 2023, pp. 2122\u20132131. Association for Computing Machinery, New York, NY, USA (2023)","DOI":"10.1145\/3543507.3583306"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Zanella-B\u00e9guelin, S., et al.: Analyzing information leakage of updates to natural language models. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 363\u2013375. Association for Computing Machinery, New York, NY, USA (2020)","DOI":"10.1145\/3372297.3417880"},{"key":"1_CR34","doi-asserted-by":"publisher","first-page":"8729","DOI":"10.1109\/TKDE.2022.3207915","volume":"35","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Liu, Q., Huang, Z., Wang, H., Lee, C.K., Chen, E.: Model inversion attacks against graph neural networks. IEEE Trans. Knowl. Data Eng. 35, 8729\u20138741 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"1_CR35","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.1007\/s12083-021-01074-w","volume":"14","author":"L Zheng","year":"2021","unstructured":"Zheng, L., Zhou, J., Chen, C., Wu, B., Wang, L., Zhang, B.: Asfgnn: automated separated-federated graph neural network. Peer-to-Peer Network. Appl. 14(3), 1692\u20131704 (2021)","journal-title":"Peer-to-Peer Network. Appl."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1528-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:29:14Z","timestamp":1750937354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1528-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615278","9789819615285"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1528-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}