{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:40:53Z","timestamp":1740102053044,"version":"3.37.3"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001807","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072061,61976030"],"award-info":[{"award-number":["62072061,61976030"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/1000000010","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2153393"],"award-info":[{"award-number":["CNS-2153393"]}],"id":[{"id":"10.13039\/1000000010","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1109\/ijcnn54540.2023.10191065","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:30:03Z","timestamp":1690997403000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Towards Inference of Original Graph Data Information from Graph Embeddings"],"prefix":"10.1109","author":[{"given":"Xinyang","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University,Chongqing,China"}]},{"given":"Xinyu","family":"Lei","sequence":"additional","affiliation":[{"name":"Michigan Technological University,Department of Computer Science,USA"}]},{"given":"Yantao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University,Chongqing,China"}]},{"given":"Huafeng","family":"Qin","sequence":"additional","affiliation":[{"name":"School of CSIE, Chongqing Technology and Business University,China"}]},{"given":"Yiwen","family":"Hu","sequence":"additional","affiliation":[{"name":"Michigan State University,Department of CSE,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01228-1_25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12328"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MASS56207.2022.00047"},{"key":"ref15","article-title":"Mobilenets: Efficient convo-lutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3243782"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299182"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-022-00447-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132990"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"ref10","first-page":"1473","article-title":"Deep-walking backwards: From embeddings back to graphs","author":"chanpuriya","year":"0","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"ref2","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref1","first-page":"1","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","author":"defferrard","year":"0","journal-title":"Neural Information Processing Systems Conf (NIPS)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19969"},{"key":"ref16","first-page":"1","article-title":"Graph attention networks","author":"velickovic","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref38","first-page":"1","article-title":"Link prediction based on graph neural networks","author":"zhang","year":"0","journal-title":"Conference on Neural Information Processing Systems (NeurIPS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20898"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20629"},{"key":"ref24","first-page":"874","article-title":"Spectral clustering with graph neural networks for graph pooling","author":"bianchi","year":"0","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref23","article-title":"Spectral networks and locally connected networks on graphs","author":"bruna","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3008732"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462968"},{"key":"ref20","first-page":"4210","article-title":"Powerful graph convo-lutional networks with adaptive propagation mechanism for homophily and heterophily","author":"wang","year":"0","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref21","article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"xiao","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1345"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2986316"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803734"},{"key":"ref7","first-page":"1","article-title":"Inference attacks against graph neural networks","author":"zhang","year":"0","journal-title":"USENIX Security Symposium (USENIX Security)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref4","first-page":"1","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"0","journal-title":"Neural Information Processing Systems Conf (NIPS)"},{"key":"ref3","first-page":"1","article-title":"How powerful are graph neural networks","author":"xu","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3448891.3448939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00361"}],"event":{"name":"2023 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2023,6,18]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10190990\/10190992\/10191065.pdf?arnumber=10191065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:42:42Z","timestamp":1692639762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10191065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ijcnn54540.2023.10191065","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]}}}