{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:01:04Z","timestamp":1768420864622,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595791","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"109-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2352-0485","authenticated-orcid":false,"given":"Chenhan","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6123-1457","authenticated-orcid":false,"given":"Weiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6392-6711","authenticated-orcid":false,"given":"James J.Q.","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. International Conference on Learning Representations.","author":"Alemi A.","year":"2017","unstructured":"Alexander\u00a0 A. Alemi , Ian Fischer , Joshua\u00a0 V. Dillon , and Kevin Murphy . 2017 . Deep Variational Information Bottleneck . In Proc. International Conference on Learning Representations. Alexander\u00a0A. Alemi, Ian Fischer, Joshua\u00a0V. Dillon, and Kevin Murphy. 2017. Deep Variational Information Bottleneck. In Proc. International Conference on Learning Representations."},{"key":"e_1_3_2_1_2_1","volume-title":"QSGD: Communication-efficient SGD via gradient quantization and encoding. Advances in neural information processing systems 30","author":"Alistarh Dan","year":"2017","unstructured":"Dan Alistarh , Demjan Grubic , Jerry Li , Ryota Tomioka , and Milan Vojnovic . 2017 . QSGD: Communication-efficient SGD via gradient quantization and encoding. Advances in neural information processing systems 30 (2017). Dan Alistarh, Demjan Grubic, Jerry Li, Ryota Tomioka, and Milan Vojnovic. 2017. QSGD: Communication-efficient SGD via gradient quantization and encoding. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210","author":"Caldas Sebastian","year":"2018","unstructured":"Sebastian Caldas , Jakub Kone\u010dny , H\u00a0Brendan McMahan , and Ameet Talwalkar . 2018. Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210 ( 2018 ). Sebastian Caldas, Jakub Kone\u010dny, H\u00a0Brendan McMahan, and Ameet Talwalkar. 2018. Expanding the reach of federated learning by reducing client resource requirements. arXiv preprint arXiv:1812.07210 (2018)."},{"key":"e_1_3_2_1_4_1","volume-title":"Robustness, Fairness, and Explainability. arXiv preprint arXiv:2204.08570","author":"Dai Enyan","year":"2022","unstructured":"Enyan Dai , Tianxiang Zhao , Huaisheng Zhu , Junjie Xu , Zhimeng Guo , Hui Liu , Jiliang Tang , and Suhang Wang . 2022. A Comprehensive Survey on Trustworthy Graph Neural Networks: Privacy , Robustness, Fairness, and Explainability. arXiv preprint arXiv:2204.08570 ( 2022 ). Enyan Dai, Tianxiang Zhao, Huaisheng Zhu, Junjie Xu, Zhimeng Guo, Hui Liu, Jiliang Tang, and Suhang Wang. 2022. A Comprehensive Survey on Trustworthy Graph Neural Networks: Privacy, Robustness, Fairness, and Explainability. arXiv preprint arXiv:2204.08570 (2022)."},{"key":"e_1_3_2_1_5_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Fredrikson Matthew","year":"2014","unstructured":"Matthew Fredrikson , Eric Lantz , Somesh Jha , Simon Lin , David Page , and Thomas Ristenpart . 2014 . Privacy in pharmacogenetics: An { End-to-End} case study of personalized warfarin dosing . In 23rd USENIX Security Symposium (USENIX Security 14) . 17\u201332. Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in pharmacogenetics: An { End-to-End} case study of personalized warfarin dosing. In 23rd USENIX Security Symposium (USENIX Security 14). 17\u201332."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. International Conference on Learning Representations.","author":"Goodfellow J.","year":"2015","unstructured":"Ian\u00a0 J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples . In Proc. International Conference on Learning Representations. Ian\u00a0J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In Proc. International Conference on Learning Representations."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. Advances in neural information processing systems 30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton , Zhitao Ying , and Jure Leskovec . 2017 . Inductive representation learning on large graphs . Proc. Advances in neural information processing systems 30 (2017). Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Proc. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_8_1","volume-title":"Spreadgnn: Serverless multi-task federated learning for graph neural networks. arXiv preprint arXiv:2106.02743","author":"He Chaoyang","year":"2021","unstructured":"Chaoyang He , Emir Ceyani , Keshav Balasubramanian , Murali Annavaram , and Salman Avestimehr . 2021 . Spreadgnn: Serverless multi-task federated learning for graph neural networks. arXiv preprint arXiv:2106.02743 (2021). Chaoyang He, Emir Ceyani, Keshav Balasubramanian, Murali Annavaram, and Salman Avestimehr. 2021. Spreadgnn: Serverless multi-task federated learning for graph neural networks. arXiv preprint arXiv:2106.02743 (2021)."},{"key":"e_1_3_2_1_9_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"He Xinlei","year":"2021","unstructured":"Xinlei He , Jinyuan Jia , Michael Backes , Neil\u00a0Zhenqiang Gong , and Yang Zhang . 2021 . Stealing links from graph neural networks . In 30th USENIX Security Symposium (USENIX Security 21) . 2669\u20132686. Xinlei He, Jinyuan Jia, Michael Backes, Neil\u00a0Zhenqiang Gong, and Yang Zhang. 2021. Stealing links from graph neural networks. In 30th USENIX Security Symposium (USENIX Security 21). 2669\u20132686."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. ACM SIGSAC conference on computer and communications security. 603\u2013618","author":"Hitaj Briland","year":"2017","unstructured":"Briland Hitaj , Giuseppe Ateniese , and Fernando Perez-Cruz . 2017 . Deep models under the GAN: information leakage from collaborative deep learning . In Proc. ACM SIGSAC conference on computer and communications security. 603\u2013618 . Briland Hitaj, Giuseppe Ateniese, and Fernando Perez-Cruz. 2017. Deep models under the GAN: information leakage from collaborative deep learning. In Proc. ACM SIGSAC conference on computer and communications security. 603\u2013618."},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Learning Representations.","author":"Hjelm R\u00a0Devon","year":"2018","unstructured":"R\u00a0Devon Hjelm , Alex Fedorov , Samuel Lavoie-Marchildon , Karan Grewal , Phil Bachman , Adam Trischler , and Yoshua Bengio . 2018 . Learning deep representations by mutual information estimation and maximization . In International Conference on Learning Representations. R\u00a0Devon Hjelm, Alex Fedorov, Samuel Lavoie-Marchildon, Karan Grewal, Phil Bachman, Adam Trischler, and Yoshua Bengio. 2018. Learning deep representations by mutual information estimation and maximization. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_12_1","unstructured":"George Karypis and Vipin Kumar. 1997. METIS: A software package for partitioning unstructured graphs partitioning meshes and computing fill-reducing orderings of sparse matrices. Technical Report. Computer Science & Engineering (CS&E) Technical Reports.  George Karypis and Vipin Kumar. 1997. METIS: A software package for partitioning unstructured graphs partitioning meshes and computing fill-reducing orderings of sparse matrices. Technical Report. Computer Science & Engineering (CS&E) Technical Reports."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. International Conference on Learning Representations.","author":"N.","unstructured":"Thomas\u00a0 N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks . In Proc. International Conference on Learning Representations. Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In Proc. International Conference on Learning Representations."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.ypmed.2017.07.006","article-title":"Crowdsourced data collection for public health: A comparison with nationally representative, population tobacco use data","volume":"102","author":"Kraemer D","year":"2017","unstructured":"John\u00a0 D Kraemer , Andrew\u00a0 A Strasser , Eric\u00a0 N Lindblom , Raymond\u00a0 S Niaura , and Darren Mays . 2017 . Crowdsourced data collection for public health: A comparison with nationally representative, population tobacco use data . Preventive Medicine 102 (2017), 93 \u2013 99 . John\u00a0D Kraemer, Andrew\u00a0A Strasser, Eric\u00a0N Lindblom, Raymond\u00a0S Niaura, and Darren Mays. 2017. Crowdsourced data collection for public health: A comparison with nationally representative, population tobacco use data. Preventive Medicine 102 (2017), 93\u201399.","journal-title":"Preventive Medicine"},{"key":"e_1_3_2_1_15_1","volume-title":"Peer-to-peer federated learning on graphs. arXiv preprint arXiv:1901.11173","author":"Lalitha Anusha","year":"2019","unstructured":"Anusha Lalitha , Osman\u00a0Cihan Kilinc , Tara Javidi , and Farinaz Koushanfar . 2019. Peer-to-peer federated learning on graphs. arXiv preprint arXiv:1901.11173 ( 2019 ). Anusha Lalitha, Osman\u00a0Cihan Kilinc, Tara Javidi, and Farinaz Koushanfar. 2019. Peer-to-peer federated learning on graphs. arXiv preprint arXiv:1901.11173 (2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"On the Convergence of FedAvg on Non-IID Data. In International Conference on Learning Representations.","author":"Li Xiang","year":"2019","unstructured":"Xiang Li , Kaixuan Huang , Wenhao Yang , Shusen Wang , and Zhihua Zhang . 2019 . On the Convergence of FedAvg on Non-IID Data. In International Conference on Learning Representations. Xiang Li, Kaixuan Huang, Wenhao Yang, Shusen Wang, and Zhihua Zhang. 2019. On the Convergence of FedAvg on Non-IID Data. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_17_1","volume-title":"Privacy and robustness in federated learning: Attacks and defenses","author":"Lyu Lingjuan","year":"2022","unstructured":"Lingjuan Lyu , Han Yu , Xingjun Ma , Chen Chen , Lichao Sun , Jun Zhao , Qiang Yang , and S\u00a0Yu Philip . 2022. Privacy and robustness in federated learning: Attacks and defenses . IEEE transactions on neural networks and learning systems ( 2022 ). Lingjuan Lyu, Han Yu, Xingjun Ma, Chen Chen, Lichao Sun, Jun Zhao, Qiang Yang, and S\u00a0Yu Philip. 2022. Privacy and robustness in federated learning: Attacks and defenses. IEEE transactions on neural networks and learning systems (2022)."},{"key":"e_1_3_2_1_18_1","volume-title":"2014 IEEE Information Theory Workshop (ITW","author":"Makhdoumi Ali","year":"2014","unstructured":"Ali Makhdoumi , Salman Salamatian , Nadia Fawaz , and Muriel M\u00e9dard . 2014 . From the information bottleneck to the privacy funnel . In 2014 IEEE Information Theory Workshop (ITW 2014). IEEE, 501\u2013505. Ali Makhdoumi, Salman Salamatian, Nadia Fawaz, and Muriel M\u00e9dard. 2014. From the information bottleneck to the privacy funnel. In 2014 IEEE Information Theory Workshop (ITW 2014). IEEE, 501\u2013505."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510587"},{"key":"e_1_3_2_1_20_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273\u20131282.  Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273\u20131282."},{"key":"e_1_3_2_1_21_1","volume-title":"SoK: Differential Privacy on Graph-Structured Data. arXiv preprint arXiv:2203.09205","author":"Mueller T","year":"2022","unstructured":"Tamara\u00a0 T Mueller , Dmitrii Usynin , Johannes\u00a0 C Paetzold , Daniel Rueckert , and Georgios Kaissis . 2022. SoK: Differential Privacy on Graph-Structured Data. arXiv preprint arXiv:2203.09205 ( 2022 ). Tamara\u00a0T Mueller, Dmitrii Usynin, Johannes\u00a0C Paetzold, Daniel Rueckert, and Georgios Kaissis. 2022. SoK: Differential Privacy on Graph-Structured Data. arXiv preprint arXiv:2203.09205 (2022)."},{"key":"e_1_3_2_1_22_1","volume-title":"10th International Workshop on Mining and Learning with Graphs, Vol.\u00a08. 1.","author":"Namata Galileo","year":"2012","unstructured":"Galileo Namata , Ben London , Lise Getoor , Bert Huang , and U Edu . 2012 . Query-driven active surveying for collective classification . In 10th International Workshop on Mining and Learning with Graphs, Vol.\u00a08. 1. Galileo Namata, Ben London, Lise Getoor, Bert Huang, and U Edu. 2012. Query-driven active surveying for collective classification. In 10th International Workshop on Mining and Learning with Graphs, Vol.\u00a08. 1."},{"key":"e_1_3_2_1_23_1","volume-title":"f-gan: Training generative neural samplers using variational divergence minimization. Advances in neural information processing systems 29","author":"Nowozin Sebastian","year":"2016","unstructured":"Sebastian Nowozin , Botond Cseke , and Ryota Tomioka . 2016. f-gan: Training generative neural samplers using variational divergence minimization. Advances in neural information processing systems 29 ( 2016 ). Sebastian Nowozin, Botond Cseke, and Ryota Tomioka. 2016. f-gan: Training generative neural samplers using variational divergence minimization. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. The Web Conference","author":"Peng Zhen","year":"2020","unstructured":"Zhen Peng , Wenbing Huang , Minnan Luo , Qinghua Zheng , Yu Rong , Tingyang Xu , and Junzhou Huang . 2020 . Graph representation learning via graphical mutual information maximization . In Proc. The Web Conference 2020. 259\u2013270. Zhen Peng, Wenbing Huang, Minnan Luo, Qinghua Zheng, Yu Rong, Tingyang Xu, and Junzhou Huang. 2020. Graph representation learning via graphical mutual information maximization. In Proc. The Web Conference 2020. 259\u2013270."},{"key":"e_1_3_2_1_25_1","volume-title":"Vol.\u00a01","author":"Sabt Mohamed","unstructured":"Mohamed Sabt , Mohammed Achemlal , and Abdelmadjid Bouabdallah . 2015. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA , Vol.\u00a01 . IEEE , 57\u201364. Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol.\u00a01. IEEE, 57\u201364."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"e_1_3_2_1_27_1","volume-title":"Collective classification in network data. AI magazine 29, 3","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen , Galileo Namata , Mustafa Bilgic , Lise Getoor , Brian Galligher , and Tina Eliassi-Rad . 2008. Collective classification in network data. AI magazine 29, 3 ( 2008 ), 93\u201393. Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine 29, 3 (2008), 93\u201393."},{"key":"e_1_3_2_1_28_1","volume-title":"International Conference on Learning Representations.","author":"Sun Fan-Yun","year":"2020","unstructured":"Fan-Yun Sun , Jordon Hoffman , Vikas Verma , and Jian Tang . 2020 . InfoGraph: Unsupervised and Semi-supervised Graph-Level Representation Learning via Mutual Information Maximization . In International Conference on Learning Representations. Fan-Yun Sun, Jordon Hoffman, Vikas Verma, and Jian Tang. 2020. InfoGraph: Unsupervised and Semi-supervised Graph-Level Representation Learning via Mutual Information Maximization. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_29_1","volume-title":"Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528","author":"Sun Lichao","year":"2018","unstructured":"Lichao Sun , Yingtong Dou , Carl Yang , Ji Wang , Philip\u00a0 S Yu , Lifang He , and Bo Li. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528 ( 2018 ). Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Philip\u00a0S Yu, Lifang He, and Bo Li. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528 (2018)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. AAAI Conference on Artificial Intelligence, Vol.\u00a036","author":"Sun Qingyun","year":"2022","unstructured":"Qingyun Sun , Jianxin Li , Hao Peng , Jia Wu , Xingcheng Fu , Cheng Ji , and S\u00a0Yu Philip . 2022 . Graph structure learning with variational information bottleneck . In Proc. AAAI Conference on Artificial Intelligence, Vol.\u00a036 . 4165\u20134174. Qingyun Sun, Jianxin Li, Hao Peng, Jia Wu, Xingcheng Fu, Cheng Ji, and S\u00a0Yu Philip. 2022. Graph structure learning with variational information bottleneck. In Proc. AAAI Conference on Artificial Intelligence, Vol.\u00a036. 4165\u20134174."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of the 37-th Annual Allerton Conference on Communication, Control and Computing. 368\u2013377","author":"Tishby Naftali","year":"1999","unstructured":"Naftali Tishby , Fernando\u00a0 C. Pereira , and William Bialek . 1999 . The information bottleneck method . In Proc. of the 37-th Annual Allerton Conference on Communication, Control and Computing. 368\u2013377 . https:\/\/arxiv.org\/abs\/physics\/0004057 Naftali Tishby, Fernando\u00a0C. Pereira, and William Bialek. 1999. The information bottleneck method. In Proc. of the 37-th Annual Allerton Conference on Communication, Control and Computing. 368\u2013377. https:\/\/arxiv.org\/abs\/physics\/0004057"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2968188"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. International Conference on Learning Representations.","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107 , Guillem Cucurull , Arantxa Casanova , Adriana Romero , Pietro Li\u00f2 , and Yoshua Bengio . 2018 . Graph Attention Networks . In Proc. International Conference on Learning Representations. Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph Attention Networks. In Proc. International Conference on Learning Representations."},{"key":"e_1_3_2_1_34_1","volume-title":"Deep Graph Infomax. In 7th International Conference on Learning Representations, ICLR 2019","author":"Velickovic Petar","year":"2019","unstructured":"Petar Velickovic , William Fedus , William\u00a0 L. Hamilton , Pietro Li\u00f2 , Yoshua Bengio , and R.\u00a0 Devon Hjelm . 2019 . Deep Graph Infomax. In 7th International Conference on Learning Representations, ICLR 2019 , New Orleans, LA, USA , May 6-9, 2019. OpenReview.net. https:\/\/openreview.net\/forum?id=rklz9iAcKQ Petar Velickovic, William Fedus, William\u00a0L. Hamilton, Pietro Li\u00f2, Yoshua Bengio, and R.\u00a0Devon Hjelm. 2019. Deep Graph Infomax. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net. https:\/\/openreview.net\/forum?id=rklz9iAcKQ"},{"key":"e_1_3_2_1_35_1","volume-title":"Graphfl: A federated learning framework for semi-supervised node classification on graphs. arXiv preprint arXiv:2012.04187","author":"Wang Binghui","year":"2020","unstructured":"Binghui Wang , Ang Li , Hai Li , and Yiran Chen . 2020 . Graphfl: A federated learning framework for semi-supervised node classification on graphs. arXiv preprint arXiv:2012.04187 (2020). Binghui Wang, Ang Li, Hai Li, and Yiran Chen. 2020. Graphfl: A federated learning framework for semi-supervised node classification on graphs. arXiv preprint arXiv:2012.04187 (2020)."},{"key":"e_1_3_2_1_36_1","volume-title":"International Conference on Machine Learning. PMLR, 9908\u20139918","author":"Wang Rundong","year":"2020","unstructured":"Rundong Wang , Xu He , Runsheng Yu , Wei Qiu , Bo An , and Zinovi Rabinovich . 2020 . Learning efficient multi-agent communication: An information bottleneck approach . In International Conference on Machine Learning. PMLR, 9908\u20139918 . Rundong Wang, Xu He, Runsheng Yu, Wei Qiu, Bo An, and Zinovi Rabinovich. 2020. Learning efficient multi-agent communication: An information bottleneck approach. In International Conference on Machine Learning. PMLR, 9908\u20139918."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"e_1_3_2_1_38_1","volume-title":"2021 IEEE International Conference on Data Mining (ICDM). IEEE, 1421\u20131426","author":"Wu Bang","year":"2021","unstructured":"Bang Wu , Xiangwen Yang , Shirui Pan , and Xingliang Yuan . 2021 . Adapting membership inference attacks to GNN for graph classification: approaches and implications . In 2021 IEEE International Conference on Data Mining (ICDM). IEEE, 1421\u20131426 . Bang Wu, Xiangwen Yang, Shirui Pan, and Xingliang Yuan. 2021. Adapting membership inference attacks to GNN for graph classification: approaches and implications. In 2021 IEEE International Conference on Data Mining (ICDM). IEEE, 1421\u20131426."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 337\u2013350","author":"Wu Bang","year":"2022","unstructured":"Bang Wu , Xiangwen Yang , Shirui Pan , and Xingliang Yuan . 2022 . Model extraction attacks on graph neural networks: Taxonomy and realisation . In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 337\u2013350 . Bang Wu, Xiangwen Yang, Shirui Pan, and Xingliang Yuan. 2022. Model extraction attacks on graph neural networks: Taxonomy and realisation. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 337\u2013350."},{"key":"e_1_3_2_1_40_1","volume-title":"Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925","author":"Wu Chuhan","year":"2021","unstructured":"Chuhan Wu , Fangzhao Wu , Yang Cao , Yongfeng Huang , and Xing Xie . 2021 . Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021). Chuhan Wu, Fangzhao Wu, Yang Cao, Yongfeng Huang, and Xing Xie. 2021. Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 (2021)."},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. International Joint Conference on Artificial Intelligence. 4816\u20134823","author":"Wu Huijun","year":"2019","unstructured":"Huijun Wu , Chen Wang , Yuriy Tyshetskiy , Andrew Docherty , Kai Lu , and Liming Zhu . 2019 . Adversarial examples for graph data: deep insights into attack and defense . In Proc. International Joint Conference on Artificial Intelligence. 4816\u20134823 . Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. 2019. Adversarial examples for graph data: deep insights into attack and defense. In Proc. International Joint Conference on Artificial Intelligence. 4816\u20134823."},{"key":"e_1_3_2_1_42_1","first-page":"20437","article-title":"Graph information bottleneck","volume":"33","author":"Wu Tailin","year":"2020","unstructured":"Tailin Wu , Hongyu Ren , Pan Li , and Jure Leskovec . 2020 . Graph information bottleneck . Advances in Neural Information Processing Systems 33 (2020), 20437 \u2013 20448 . Tailin Wu, Hongyu Ren, Pan Li, and Jure Leskovec. 2020. Graph information bottleneck. Advances in Neural Information Processing Systems 33 (2020), 20437\u201320448.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339474"},{"key":"e_1_3_2_1_44_1","volume-title":"Fedgcn: Convergence and communication tradeoffs in federated training of graph convolutional networks. arXiv preprint arXiv:2201.12433","author":"Yao Yuhang","year":"2022","unstructured":"Yuhang Yao and Carlee Joe-Wong . 2022 . Fedgcn: Convergence and communication tradeoffs in federated training of graph convolutional networks. arXiv preprint arXiv:2201.12433 (2022). Yuhang Yao and Carlee Joe-Wong. 2022. Fedgcn: Convergence and communication tradeoffs in federated training of graph convolutional networks. arXiv preprint arXiv:2201.12433 (2022)."},{"key":"e_1_3_2_1_45_1","volume-title":"Graph Information Bottleneck for Subgraph Recognition. In International Conference on Learning Representations.","author":"Yu Junchi","year":"2020","unstructured":"Junchi Yu , Tingyang Xu , Yu Rong , Yatao Bian , Junzhou Huang , and Ran He . 2020 . Graph Information Bottleneck for Subgraph Recognition. In International Conference on Learning Representations. Junchi Yu, Tingyang Xu, Yu Rong, Yatao Bian, Junzhou Huang, and Ran He. 2020. Graph Information Bottleneck for Subgraph Recognition. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_46_1","volume-title":"Recognizing predictive substructures with subgraph information bottleneck","author":"Yu Junchi","year":"2021","unstructured":"Junchi Yu , Tingyang Xu , Yu Rong , Yatao Bian , Junzhou Huang , and Ran He. 2021. Recognizing predictive substructures with subgraph information bottleneck . IEEE Transactions on Pattern Analysis and Machine Intelligence ( 2021 ). Junchi Yu, Tingyang Xu, Yu Rong, Yatao Bian, Junzhou Huang, and Ran He. 2021. Recognizing predictive substructures with subgraph information bottleneck. IEEE Transactions on Pattern Analysis and Machine Intelligence (2021)."},{"key":"e_1_3_2_1_47_1","volume-title":"Trustworthy graph neural networks: Aspects, methods and trends. arXiv preprint arXiv:2205.07424","author":"Zhang He","year":"2022","unstructured":"He Zhang , Bang Wu , Xingliang Yuan , Shirui Pan , Hanghang Tong , and Jian Pei . 2022. Trustworthy graph neural networks: Aspects, methods and trends. arXiv preprint arXiv:2205.07424 ( 2022 ). He Zhang, Bang Wu, Xingliang Yuan, Shirui Pan, Hanghang Tong, and Jian Pei. 2022. Trustworthy graph neural networks: Aspects, methods and trends. arXiv preprint arXiv:2205.07424 (2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"Parallel SGD: When does averaging help?arXiv preprint arXiv:1606.07365","author":"Zhang Jian","year":"2016","unstructured":"Jian Zhang , Christopher De\u00a0Sa , Ioannis Mitliagkas , and Christopher R\u00e9. 2016. Parallel SGD: When does averaging help?arXiv preprint arXiv:1606.07365 ( 2016 ). Jian Zhang, Christopher De\u00a0Sa, Ioannis Mitliagkas, and Christopher R\u00e9. 2016. Parallel SGD: When does averaging help?arXiv preprint arXiv:1606.07365 (2016)."},{"key":"e_1_3_2_1_49_1","volume-title":"Subgraph federated learning with missing neighbor generation. Advances in Neural Information Processing Systems 34","author":"Zhang Ke","year":"2021","unstructured":"Ke Zhang , Carl Yang , Xiaoxiao Li , Lichao Sun , and Siu\u00a0Ming Yiu . 2021. Subgraph federated learning with missing neighbor generation. Advances in Neural Information Processing Systems 34 ( 2021 ). Ke Zhang, Carl Yang, Xiaoxiao Li, Lichao Sun, and Siu\u00a0Ming Yiu. 2021. Subgraph federated learning with missing neighbor generation. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.06.012"},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. USENIX Security Symposium. 1\u201318","author":"Zhang Zhikun","year":"2022","unstructured":"Zhikun Zhang , Min Chen , Michael Backes , Yun Shen , and Yang Zhang . 2022 . Inference attacks against graph neural networks . In Proc. USENIX Security Symposium. 1\u201318 . Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, and Yang Zhang. 2022. Inference attacks against graph neural networks. In Proc. USENIX Security Symposium. 1\u201318."},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. ACM Symposium on Access Control Models and Technologies. 15\u201326","author":"Zhang Zaixi","year":"2021","unstructured":"Zaixi Zhang , Jinyuan Jia , Binghui Wang , and Neil\u00a0Zhenqiang Gong . 2021 . Backdoor attacks to graph neural networks . In Proc. ACM Symposium on Access Control Models and Technologies. 15\u201326 . Zaixi Zhang, Jinyuan Jia, Binghui Wang, and Neil\u00a0Zhenqiang Gong. 2021. Backdoor attacks to graph neural networks. In Proc. ACM Symposium on Access Control Models and Technologies. 15\u201326."},{"key":"e_1_3_2_1_53_1","volume-title":"Model inversion attacks against graph neural networks","author":"Zhang Zaixi","year":"2022","unstructured":"Zaixi Zhang , Qi Liu , Zhenya Huang , Hao Wang , Chee-Kong Lee , and Enhong Chen . 2022. Model inversion attacks against graph neural networks . IEEE Transactions on Knowledge and Data Engineering ( 2022 ). Zaixi Zhang, Qi Liu, Zhenya Huang, Hao Wang, Chee-Kong Lee, and Enhong Chen. 2022. Model inversion attacks against graph neural networks. IEEE Transactions on Knowledge and Data Engineering (2022)."},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. International Joint Conference on Artificial Intelligence, IJCAI 2021","author":"Zhang Zaixi","year":"2021","unstructured":"Zaixi Zhang , Qi Liu , Zhenya Huang , Hao Wang , Chengqiang Lu , Chuanren Liu , and Enhong Chen . 2021 . GraphMI: Extracting Private Graph Data from Graph Neural Networks . In Proc. International Joint Conference on Artificial Intelligence, IJCAI 2021 , Virtual Event \/ Montreal, Canada , 19-27 August 2021, Zhi-Hua Zhou (Ed.). ijcai.org, 3749\u20133755. Zaixi Zhang, Qi Liu, Zhenya Huang, Hao Wang, Chengqiang Lu, Chuanren Liu, and Enhong Chen. 2021. GraphMI: Extracting Private Graph Data from Graph Neural Networks. In Proc. International Joint Conference on Artificial Intelligence, IJCAI 2021, Virtual Event \/ Montreal, Canada, 19-27 August 2021, Zhi-Hua Zhou (Ed.). ijcai.org, 3749\u20133755."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01074-w"},{"key":"e_1_3_2_1_57_1","volume-title":"Proc. ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2847\u20132856","author":"Z\u00fcgner Daniel","year":"2018","unstructured":"Daniel Z\u00fcgner , Amir Akbarnejad , and Stephan G\u00fcnnemann . 2018 . Adversarial attacks on neural networks for graph data . In Proc. ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2847\u20132856 . Daniel Z\u00fcgner, Amir Akbarnejad, and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In Proc. ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2847\u20132856."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595791","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":57,"alternative-id":["10.1145\/3579856.3595791","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595791","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}