{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:56Z","timestamp":1742913836544,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785391"},{"type":"electronic","value":"9789819785407"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8540-7_14","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T10:01:56Z","timestamp":1729159316000},"page":"225-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Federated Parameter Aggregation Method for\u00a0Node Classification Tasks with\u00a0Different Graph Network Structures"],"prefix":"10.1007","author":[{"given":"Hao","family":"Song","sequence":"first","affiliation":[]},{"given":"Jiacheng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xuanze","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shaocong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Shibo","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Jiajun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chenbo","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Shanqing","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"14_CR1","unstructured":"Posfai, M., Barabasi, A.L.: Network Science. Citeseer (2016)"},{"issue":"6","key":"14_CR2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.066101","volume":"83","author":"C Fu","year":"2011","unstructured":"Fu, C., Wang, X.: Network growth under the constraint of synchronization stability. Phys. Rev. E 83(6), 066101 (2011)","journal-title":"Phys. Rev. E"},{"issue":"3","key":"14_CR3","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1109\/TNSE.2019.2942341","volume":"7","author":"C Fu","year":"2019","unstructured":"Fu, C., Zheng, Y., Liu, Y., Xuan, Q., Chen, G.: NES-TL: network embedding similarity-based transfer learning. IEEE Trans. Netw. Sci. Eng. 7(3), 1607\u20131618 (2019)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"14_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2609-8","volume-title":"Graph Data Mining: Algorithm, Security and Application","author":"Q Xuan","year":"2021","unstructured":"Xuan, Q., Ruan, Z., Min, Y.: Graph Data Mining: Algorithm, Security and Application. Springer, Cham (2021)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Gori, M., Monfardini, G., Scarselli, F.: A new model for learning in graph domains. In: Proceedings. 2005 IEEE International Joint Conference on Neural Networks, vol.\u00a02, pp. 729\u2013734. IEEE (2005)","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Gong, S., Zhou, J., Xie, C., Xuan, Q.: Neighborhood homophily-based graph convolutional network. In: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, pp. 3908\u20133912 (2023)","DOI":"10.1145\/3583780.3615195"},{"key":"14_CR7","unstructured":"Xie, C., et al.: PathMLP: smooth path towards high-order homophily (2023)"},{"key":"14_CR8","unstructured":"Zhou, J., Gong, S., Xie, C., Yu, S., Xuan, Q., Yang, X.: Clarify confused nodes via separated learning (2024)"},{"issue":"4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"3478","DOI":"10.1109\/TNSE.2021.3115104","volume":"8","author":"J Wang","year":"2021","unstructured":"Wang, J., et al.: Sampling subgraph network with application to graph classification. IEEE Trans. Netw. Sci. Eng. 8(4), 3478\u20133490 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"14_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-981-16-7993-3_1","volume-title":"Blockchain and Trustworthy Systems","author":"J Shen","year":"2021","unstructured":"Shen, J., Zhou, J., Xie, Y., Yu, S., Xuan, Q.: Identity inference on blockchain using graph neural network. In: Dai, H.-N., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds.) BlockSys 2021. CCIS, vol. 1490, pp. 3\u201317. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-7993-3_1"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"3433","DOI":"10.1109\/TIFS.2022.3208471","volume":"17","author":"J Zhou","year":"2022","unstructured":"Zhou, J., Hu, C., Chi, J., Wu, J., Shen, M., Xuan, Q.: Behavior-aware account de-anonymization on ethereum interaction graph. IEEE Trans. Inf. Forensics Secur. 17, 3433\u20133448 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"14_CR12","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/TNSE.2020.3032950","volume":"8","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Shen, J., Yu, S., Chen, G., Xuan, Q.: M-evolve: structural-mapping-based data augmentation for graph classification. IEEE Trans. Netw. Sci. Eng. 8(1), 190\u2013200 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, J., Shen, J., Xuan, Q.: Data augmentation for graph classification. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 2341\u20132344 (2020)","DOI":"10.1145\/3340531.3412086"},{"key":"14_CR14","unstructured":"Zhang, M., Chen, Y.: Link prediction based on graph neural networks. In: Advances in Neural Information Processing Systems, vol. 31, pp. 5165\u20135175 (2018)"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-1-4419-8462-3_5","volume-title":"Social Network Data Analytics","author":"S Bhagat","year":"2011","unstructured":"Bhagat, S., Cormode, G., Muthukrishnan, S.: Node classification in social networks. In: Aggarwal, C. (ed.) Social Network Data Analytics, pp. 115\u2013148. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-1-4419-8462-3_5"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, M., Cui, Z., Neumann, M., Chen, Y.: An end-to-end deep learning architecture for graph classification. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v32i1.11782"},{"issue":"2","key":"14_CR17","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1109\/TKDE.2019.2933833","volume":"33","author":"S Yu","year":"2021","unstructured":"Yu, S., et al.: Target defense against link-prediction-based attacks via evolutionary perturbations. IEEE Trans. Knowl. Data Eng. 33(2), 754\u2013767 (2021). https:\/\/doi.org\/10.1109\/TKDE.2019.2933833","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"14_CR18","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/TKDE.2018.2801854","volume":"30","author":"C Fu","year":"2018","unstructured":"Fu, C., et al.: Link weight prediction using supervised learning methods and its application to yelp layered network. IEEE Trans. Knowl. Data Eng. 30(8), 1507\u20131518 (2018). https:\/\/doi.org\/10.1109\/TKDE.2018.2801854","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32(1), 4\u201324 (2020)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Guo, Y., Tong, X.: View-volume network for semantic scene completion from a single depth image. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, pp. 726\u2013732 (2018)","DOI":"10.24963\/ijcai.2018\/101"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Yi, L., Su, H., Guo, X., Guibas, L.J.: SyncSpecCNN: synchronized spectral CNN for 3D shape segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2282\u20132290 (2017)","DOI":"10.1109\/CVPR.2017.697"},{"key":"14_CR22","unstructured":"van den Berg, R., Kipf, T.N., Welling, M.: Graph convolutional matrix completion. arXiv preprint arXiv:1706.02263 (2017)"},{"key":"14_CR23","unstructured":"Monti, F., Bronstein, M., Bresson, X.: Geometric matrix completion with recurrent multi-graph neural networks. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Ying, R., He, R., Chen, K., Eksombatchai, P., Hamilton, W.L., Leskovec, J.: Graph convolutional neural networks for web-scale recommender systems. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 974\u2013983 (2018)","DOI":"10.1145\/3219819.3219890"},{"key":"14_CR25","unstructured":"Ahmed, N.K., et al.: Inductive representation learning in large attributed graphs. Stat 1050, 22 (2017)"},{"key":"14_CR26","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Qiu, J., Tang, J., Ma, H., Dong, Y., Wang, K., Tang, J.: DeepInf: social influence prediction with deep learning. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2110\u20132119 (2018)","DOI":"10.1145\/3219819.3220077"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Luong, M.T., Pham, H., Manning, C.D.: Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 (2015)","DOI":"10.18653\/v1\/D15-1166"},{"key":"14_CR29","unstructured":"Wu, Y., et\u00a0al.: Google\u2019s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144 (2016)"},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.neuroimage.2016.09.046","volume":"146","author":"J Kawahara","year":"2017","unstructured":"Kawahara, J., et al.: BrainNetCNN: convolutional neural networks for brain networks; towards predicting neurodevelopment. Neuroimage 146, 1038\u20131049 (2017)","journal-title":"Neuroimage"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: FedVision: an online visual object detection platform powered by federated learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 13172\u201313179 (2020)","DOI":"10.1609\/aaai.v34i08.7021"},{"key":"14_CR32","unstructured":"Chen, C., et al.: Vertically federated graph neural network for privacy-preserving node classification. arXiv preprint arXiv:2005.11903 (2020)"},{"key":"14_CR33","unstructured":"Ni, X., Xu, X., Lyu, L., Meng, C., Wang, W.: A vertical federated learning framework for graph convolutional network. arXiv preprint arXiv:2106.11593 (2021)"},{"issue":"3","key":"14_CR34","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.1007\/s12083-021-01074-w","volume":"14","author":"L Zheng","year":"2021","unstructured":"Zheng, L., Zhou, J., Chen, C., Wu, B., Wang, L., Zhang, B.: ASFGNN: automated separated-federated graph neural network. Peer-to-Peer Netw. Appl. 14(3), 1692\u20131704 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Wu, C., Wu, F., Cao, Y., Huang, Y., Xie, X.: FedGNN: federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021)","DOI":"10.1038\/s41467-022-30714-9"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Lin, B.Y., et al.: FedNLP: benchmarking federated learning methods for natural language processing tasks. arXiv preprint arXiv:2104.08815 (2021)","DOI":"10.18653\/v1\/2022.findings-naacl.13"},{"issue":"20","key":"14_CR37","first-page":"10","volume":"1050","author":"P Velickovic","year":"2017","unstructured":"Velickovic, P., et al.: Graph attention networks. Stat 1050(20), 10\u201348550 (2017)","journal-title":"Stat"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Song, W., Xiao, Z., Wang, Y., Charlin, L., Zhang, M., Tang, J.: Session-based social recommendation via dynamic graph attention networks. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, pp. 555\u2013563 (2019)","DOI":"10.1145\/3289600.3290989"},{"key":"14_CR39","unstructured":"Kosaraju, V., Sadeghian, A., Mart\u00edn-Mart\u00edn, R., Reid, I., Rezatofighi, H., Savarese, S.: Social-BiGAT: multimodal trajectory forecasting using bicycle-GAN and graph attention networks. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Jia, J., Salem, A., Backes, M., Zhang, Y., Gong, N.Z.: MemGuard: defending against black-box membership inference attacks via adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 259\u2013274 (2019)","DOI":"10.1145\/3319535.3363201"},{"issue":"5","key":"14_CR41","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Duddu, V., Boutet, A., Shejwalkar, V.: Quantifying privacy leakage in graph embedding. In: MobiQuitous 2020-17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 76\u201385 (2020)","DOI":"10.1145\/3448891.3448939"},{"key":"14_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"14_CR45","unstructured":"Choudhury, O., et al.: Differential privacy-enabled federated learning for sensitive health data. arXiv preprint arXiv:1910.02578 (2019)"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338. IEEE (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"14_CR47","unstructured":"Hardy, S., et al.: Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017)"},{"key":"14_CR48","unstructured":"Kone\u010dn\u1ef3, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)"},{"key":"14_CR49","unstructured":"Yang, C., Liu, Z., Zhao, D., Sun, M., Chang, E.: Network representation learning with rich text information. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"key":"14_CR50","doi-asserted-by":"crossref","unstructured":"Rozemberczki, B., Sarkar, R.: Characteristic functions on graphs: birds of a feather, from statistical descriptors to parametric models. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 1325\u20131334 (2020)","DOI":"10.1145\/3340531.3411866"},{"key":"14_CR51","unstructured":"Zhao, B., Sen, P., Getoor, L.: Entity and relationship labeling in affiliation networks. In: ICML Workshop on Statistical Network Analysis. Citeseer (2006)"},{"key":"14_CR52","unstructured":"Luca, M.: Reviews, reputation, and revenue: the case of yelp. com. Com (March 15, 2016). Harvard Business School NOM Unit Working Paper (12-016) (2016)"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8540-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T10:04:45Z","timestamp":1729159485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8540-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785391","9789819785407"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8540-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}