{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:04Z","timestamp":1750219744981,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004351","name":"Cisco gift grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3615104","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:42Z","timestamp":1697874342000},"page":"3474-3483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Unveiling the Role of Message Passing in Dual-Privacy Preservation on GNNs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5239-9871","authenticated-orcid":false,"given":"Tianyi","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6064-1369","authenticated-orcid":false,"given":"Hui","family":"Hu","sequence":"additional","affiliation":[{"name":"Wyoming University, Larami, WY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2503-2522","authenticated-orcid":false,"given":"Lu","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Towards a Unified Framework for Fair and Stable Graph Representation Learning. arXiv preprint arXiv:2102.13186","author":"Agarwal Chirag","year":"2021","unstructured":"Chirag Agarwal , Himabindu Lakkaraju , and Marinka Zitnik . 2021. Towards a Unified Framework for Fair and Stable Graph Representation Learning. arXiv preprint arXiv:2102.13186 ( 2021 ). Chirag Agarwal, Himabindu Lakkaraju, and Marinka Zitnik. 2021. Towards a Unified Framework for Fair and Stable Graph Representation Learning. arXiv preprint arXiv:2102.13186 (2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"International conference on machine learning. PMLR, 214--223","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky , Soumith Chintala , and L\u00e9on Bottou . 2017 . Wasserstein generative adversarial networks . In International conference on machine learning. PMLR, 214--223 . Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In International conference on machine learning. PMLR, 214--223."},{"key":"e_1_3_2_1_3_1","first-page":"99","article-title":"On a measure of divergence between two statistical populations defined by their probability distribution","volume":"35","author":"Bhattacharyya Anil","year":"1943","unstructured":"Anil Bhattacharyya . 1943 . On a measure of divergence between two statistical populations defined by their probability distribution . Bulletin of the Calcutta Mathematical Society 35 (1943), 99 -- 110 . Anil Bhattacharyya. 1943. On a measure of divergence between two statistical populations defined by their probability distribution. Bulletin of the Calcutta Mathematical Society 35 (1943), 99--110.","journal-title":"Bulletin of the Calcutta Mathematical Society"},{"key":"e_1_3_2_1_4_1","volume-title":"On a measure of divergence between two multinomial populations. Sankhy\u00afa: the indian journal of statistics","author":"Bhattacharyya Anil","year":"1946","unstructured":"Anil Bhattacharyya . 1946. On a measure of divergence between two multinomial populations. Sankhy\u00afa: the indian journal of statistics ( 1946 ), 401--406. Anil Bhattacharyya. 1946. On a measure of divergence between two multinomial populations. Sankhy\u00afa: the indian journal of statistics (1946), 401--406."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108218"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1142\/13150"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12814"},{"key":"e_1_3_2_1_8_1","volume-title":"Contextual stochastic block models. Advances in Neural Information Processing Systems 31","author":"Deshpande Yash","year":"2018","unstructured":"Yash Deshpande , Subhabrata Sen , Andrea Montanari , and Elchanan Mossel . 2018. Contextual stochastic block models. Advances in Neural Information Processing Systems 31 ( 2018 ). Yash Deshpande, Subhabrata Sen, Andrea Montanari, and Elchanan Mossel. 2018. Contextual stochastic block models. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8814066"},{"key":"e_1_3_2_1_10_1","volume-title":"Quantifying Privacy Leakage in Graph Embedding. arXiv preprint arXiv:2010.00906","author":"Duddu Vasisht","year":"2020","unstructured":"Vasisht Duddu , Antoine Boutet , and Virat Shejwalkar . 2020. Quantifying Privacy Leakage in Graph Embedding. arXiv preprint arXiv:2010.00906 ( 2020 ). Vasisht Duddu, Antoine Boutet, and Virat Shejwalkar. 2020. Quantifying Privacy Leakage in Graph Embedding. arXiv preprint arXiv:2010.00906 (2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"Richard Vickers, Charles Roberts, Jian Tang, et al.","author":"Gaudelet Thomas","year":"2021","unstructured":"Thomas Gaudelet , Ben Day , Arian R Jamasb , Jyothish Soman , Cristian Regep , Gertrude Liu , Jeremy BR Hayter , Richard Vickers, Charles Roberts, Jian Tang, et al. 2021 . Utilizing graph machine learning within drug discovery and development. Briefings in bioinformatics 22, 6 (2021), bbab159. Thomas Gaudelet, Ben Day, Arian R Jamasb, Jyothish Soman, Cristian Regep, Gertrude Liu, Jeremy BR Hayter, Richard Vickers, Charles Roberts, Jian Tang, et al. 2021. Utilizing graph machine learning within drug discovery and development. Briefings in bioinformatics 22, 6 (2021), bbab159."},{"key":"e_1_3_2_1_12_1","volume-title":"International conference on machine learning. PMLR, 1263--1272","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer , Samuel S Schoenholz , Patrick F Riley , Oriol Vinyals , and George E Dahl . 2017 . Neural message passing for quantum chemistry . In International conference on machine learning. PMLR, 1263--1272 . Justin Gilmer, Samuel S Schoenholz, Patrick F Riley, Oriol Vinyals, and George E Dahl. 2017. Neural message passing for quantum chemistry. In International conference on machine learning. PMLR, 1263--1272."},{"volume-title":"25th { USENIX } Security Symposium ( { USENIX } Security 16). 979--995.","author":"Gong Neil Zhenqiang","key":"e_1_3_2_1_13_1","unstructured":"Neil Zhenqiang Gong and Bin Liu . 2016. You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors . In 25th { USENIX } Security Symposium ( { USENIX } Security 16). 979--995. Neil Zhenqiang Gong and Bin Liu. 2016. You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors. In 25th { USENIX } Security Symposium ( { USENIX } Security 16). 979--995."},{"key":"e_1_3_2_1_14_1","volume-title":"Neil Zhenqiang Gong, and Yang Zhang","author":"He Xinlei","year":"2020","unstructured":"Xinlei He , Jinyuan Jia , Michael Backes , Neil Zhenqiang Gong, and Yang Zhang . 2020 . Stealing Links from Graph Neural Networks . arXiv preprint arXiv:2005.02131 (2020). Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, and Yang Zhang. 2020. Stealing Links from Graph Neural Networks. arXiv preprint arXiv:2005.02131 (2020)."},{"key":"e_1_3_2_1_15_1","volume-title":"Wu","author":"He Xinlei","year":"2021","unstructured":"Xinlei He , Rui Wen , and Wu . 2021 . Node-Level Membership Inference Attacks Against Graph Neural Networks . arXiv preprint arXiv:2102.05429 (2021). Xinlei He, Rui Wen, and et al. Wu. 2021. Node-Level Membership Inference Attacks Against Graph Neural Networks. arXiv preprint arXiv:2102.05429 (2021)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511975"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/iSES54909.2022.00095"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118032718"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"e_1_3_2_1_20_1","volume-title":"The homophily principle in social network analysis: A survey. Multimedia Tools and Applications","author":"Khanam Kazi Zainab","year":"2022","unstructured":"Kazi Zainab Khanam , Gautam Srivastava , and Vijay Mago . 2022. The homophily principle in social network analysis: A survey. Multimedia Tools and Applications ( 2022 ), 1--44. Kazi Zainab Khanam, Gautam Srivastava, and Vijay Mago. 2022. The homophily principle in social network analysis: A survey. Multimedia Tools and Applications (2022), 1--44."},{"key":"e_1_3_2_1_21_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling . 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 ( 2016 ). Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_22_1","volume-title":"Variational graph auto-encoders. arXiv preprint arXiv:1611.07308","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling . 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 ( 2016 ). Thomas N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016)."},{"key":"e_1_3_2_1_23_1","volume-title":"Adversarial Privacy Preserving Graph Embedding against Inference Attack","author":"Li Kaiyang","year":"2020","unstructured":"Kaiyang Li , Guangchun Luo , Yang Ye , Wei Li , Shihao Ji , and Zhipeng Cai . 2020. Adversarial Privacy Preserving Graph Embedding against Inference Attack . IEEE Internet of Things Journal ( 2020 ). Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, and Zhipeng Cai. 2020. Adversarial Privacy Preserving Graph Embedding against Inference Attack. IEEE Internet of Things Journal (2020)."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Learning Representations.","author":"Li Peizhao","year":"2021","unstructured":"Peizhao Li , Yifei Wang , Han Zhao , Pengyu Hong , and Hongfu Liu . 2021 . On dyadic fairness: Exploring and mitigating bias in graph connections . In International Conference on Learning Representations. Peizhao Li, Yifei Wang, Han Zhao, Pengyu Hong, and Hongfu Liu. 2021. On dyadic fairness: Exploring and mitigating bias in graph connections. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_25_1","volume-title":"Graph Adversarial Networks: Protecting Information against Adversarial Attacks. arXiv preprint arXiv:2009.13504","author":"Liao Peiyuan","year":"2020","unstructured":"Peiyuan Liao , Han Zhao , Keyulu Xu , Tommi Jaakkola , Geoffrey Gordon , Stefanie Jegelka , and Ruslan Salakhutdinov . 2020. Graph Adversarial Networks: Protecting Information against Adversarial Attacks. arXiv preprint arXiv:2009.13504 ( 2020 ). Peiyuan Liao, Han Zhao, Keyulu Xu, Tommi Jaakkola, Geoffrey Gordon, Stefanie Jegelka, and Ruslan Salakhutdinov. 2020. Graph Adversarial Networks: Protecting Information against Adversarial Attacks. arXiv preprint arXiv:2009.13504 (2020)."},{"key":"e_1_3_2_1_26_1","volume-title":"Towards private learning on decentralized graphs with local differential privacy. arXiv preprint arXiv:2201.09398","author":"Lin Wanyu","year":"2022","unstructured":"Wanyu Lin , Baochun Li , and Cong Wang . 2022. Towards private learning on decentralized graphs with local differential privacy. arXiv preprint arXiv:2201.09398 ( 2022 ). Wanyu Lin, Baochun Li, and Cong Wang. 2022. Towards private learning on decentralized graphs with local differential privacy. arXiv preprint arXiv:2201.09398 (2022)."},{"key":"e_1_3_2_1_27_1","volume-title":"Sgnn: A graph neural network based federated learning approach by hiding structure. In Big Data","author":"Mei Guangxu","year":"2019","unstructured":"Guangxu Mei , Ziyu Guo , Shijun Liu , and Li Pan . 2019 . Sgnn: A graph neural network based federated learning approach by hiding structure. In Big Data . IEEE , 2560--2568. Guangxu Mei, Ziyu Guo, Shijun Liu, and Li Pan. 2019. Sgnn: A graph neural network based federated learning approach by hiding structure. In Big Data. IEEE, 2560--2568."},{"key":"e_1_3_2_1_28_1","volume-title":"The Matthew effect in science, II: Cumulative advantage and the symbolism of intellectual property. isis 79, 4","author":"Merton Robert K","year":"1988","unstructured":"Robert K Merton . 1988. The Matthew effect in science, II: Cumulative advantage and the symbolism of intellectual property. isis 79, 4 ( 1988 ), 606--623. Robert K Merton. 1988. The Matthew effect in science, II: Cumulative advantage and the symbolism of intellectual property. isis 79, 4 (1988), 606--623."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00002"},{"key":"e_1_3_2_1_30_1","volume-title":"When Differential Privacy Meets Graph Neural Networks. arXiv preprint arXiv:2006.05535","author":"Sajadmanesh Sina","year":"2020","unstructured":"Sina Sajadmanesh and Daniel Gatica-Perez . 2020. When Differential Privacy Meets Graph Neural Networks. arXiv preprint arXiv:2006.05535 ( 2020 ). Sina Sajadmanesh and Daniel Gatica-Perez. 2020. When Differential Privacy Meets Graph Neural Networks. arXiv preprint arXiv:2006.05535 (2020)."},{"key":"e_1_3_2_1_31_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem , Yang Zhang , Mathias Humbert , Pascal Berrang , Mario Fritz , and Michael Backes . 2018 . Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018). Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"volume-title":"25th { USENIX } Security Symposium ( { USENIX } Security 16). 601--618.","author":"Tram\u00e8r Florian","key":"e_1_3_2_1_33_1","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K Reiter , and Thomas Ristenpart . 2016. Stealing machine learning models via prediction apis . In 25th { USENIX } Security Symposium ( { USENIX } Security 16). 601--618. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction apis. In 25th { USENIX } Security Symposium ( { USENIX } Security 16). 601--618."},{"key":"e_1_3_2_1_34_1","volume-title":"Social structure of facebook networks. Physica A: Statistical Mechanics and its Applications 391, 16","author":"Traud Amanda L","year":"2012","unstructured":"Amanda L Traud , Peter J Mucha , and Mason A Porter . 2012. Social structure of facebook networks. Physica A: Statistical Mechanics and its Applications 391, 16 ( 2012 ), 4165--4180. Amanda L Traud, Peter J Mucha, and Mason A Porter. 2012. Social structure of facebook networks. Physica A: Statistical Mechanics and its Applications 391, 16 (2012), 4165--4180."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919758"},{"volume-title":"Optimal transport: old and new","author":"Villani C\u00e9dric","key":"e_1_3_2_1_36_1","unstructured":"C\u00e9dric Villani . 2009. Optimal transport: old and new . Vol. 338 . Springer . C\u00e9dric Villani. 2009. Optimal transport: old and new. Vol. 338. Springer."},{"key":"e_1_3_2_1_37_1","volume-title":"PrivacyPreserving Representation Learning on Graphs: A Mutual Information Perspective. arXiv preprint arXiv:2107.01475","author":"Wang Binghui","year":"2021","unstructured":"Binghui Wang , Jiayi Guo , Ang Li , Yiran Chen , and Hai Li. 2021. PrivacyPreserving Representation Learning on Graphs: A Mutual Information Perspective. arXiv preprint arXiv:2107.01475 ( 2021 ). Binghui Wang, Jiayi Guo, Ang Li, Yiran Chen, and Hai Li. 2021. PrivacyPreserving Representation Learning on Graphs: A Mutual Information Perspective. arXiv preprint arXiv:2107.01475 (2021)."},{"key":"e_1_3_2_1_38_1","volume-title":"CausalSE: Understanding Varied Spatial Effects with Missing Data Toward Adding New Bike-sharing Stations. ACM Transactions on Knowledge Discovery from Data 17, 2","author":"Wang Qianru","year":"2023","unstructured":"Qianru Wang , Bin Guo , Lu Cheng , Zhiwen Yu , and Huan Liu . 2023. CausalSE: Understanding Varied Spatial Effects with Missing Data Toward Adding New Bike-sharing Stations. ACM Transactions on Knowledge Discovery from Data 17, 2 ( 2023 ), 1--24. Qianru Wang, Bin Guo, Lu Cheng, Zhiwen Yu, and Huan Liu. 2023. CausalSE: Understanding Varied Spatial Effects with Missing Data Toward Adding New Bike-sharing Stations. ACM Transactions on Knowledge Discovery from Data 17, 2 (2023), 1--24."},{"key":"e_1_3_2_1_39_1","volume-title":"Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application. arXiv preprint arXiv:1309.1541","author":"Wang Weiran","year":"2013","unstructured":"Weiran Wang and Miguel A Carreira-Perpin\u00e1n . 2013. Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application. arXiv preprint arXiv:1309.1541 ( 2013 ). Weiran Wang and Miguel A Carreira-Perpin\u00e1n. 2013. Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application. arXiv preprint arXiv:1309.1541 (2013)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380186"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00182"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833806"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6930"},{"key":"e_1_3_2_1_44_1","volume-title":"DPNE: Differentially private network embedding","author":"Xu Depeng","year":"2018","unstructured":"Depeng Xu , Shuhan Yuan , Xintao Wu , and HaiNhat Phan . 2018 . DPNE: Differentially private network embedding . In PAKDD. Springer , 235--246. Depeng Xu, Shuhan Yuan, Xintao Wu, and HaiNhat Phan. 2018. DPNE: Differentially private network embedding. In PAKDD. Springer, 235--246."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 4661--4667","author":"Yang Shuo","year":"2021","unstructured":"Shuo Yang , Zhiqiang Zhang , Jun Zhou , Yang Wang , Wang Sun , Xingyu Zhong , Yanming Fang , Quan Yu , and Yuan Qi . 2021 . Financial risk analysis for SMEs with graph-based supply chain mining . In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 4661--4667 . Shuo Yang, Zhiqiang Zhang, Jun Zhou, Yang Wang, Wang Sun, Xingyu Zhong, Yanming Fang, Quan Yu, and Yuan Qi. 2021. Financial risk analysis for SMEs with graph-based supply chain mining. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 4661--4667."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 31th USENIX Security Symposium. 1--18","author":"Zhang Zhikun","year":"2022","unstructured":"Zhikun Zhang , Min Chen , Michael Backes , Yun Shen , and Yang Zhang . 2022 . Inference attacks against graph neural networks . In Proceedings of the 31th USENIX Security Symposium. 1--18 . Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, and Yang Zhang. 2022. Inference attacks against graph neural networks. In Proceedings of the 31th USENIX Security Symposium. 1--18."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Zaixi Zhang Qi Liu Zhenya Huang Hao Wang Chengqiang Lu Chuanren Liu and Enhong Chen. 2021. GraphMI: Extracting Private Graph Data from Graph Neural Networks. arXiv preprint arXiv:2106.02820 (2021).  Zaixi Zhang Qi Liu Zhenya Huang Hao Wang Chengqiang Lu Chuanren Liu and Enhong Chen. 2021. GraphMI: Extracting Private Graph Data from Graph Neural Networks. arXiv preprint arXiv:2106.02820 (2021).","DOI":"10.24963\/ijcai.2021\/516"},{"key":"e_1_3_2_1_48_1","volume-title":"Privacy-Preserving Graph Neural Network for Node Classification. arXiv preprint arXiv:2005.11903","author":"Zhou Jun","year":"2020","unstructured":"Jun Zhou , Chaochao Chen , Longfei Zheng , Xiaolin Zheng , Bingzhe Wu , Ziqi Liu , and Li Wang . 2020. Privacy-Preserving Graph Neural Network for Node Classification. arXiv preprint arXiv:2005.11903 ( 2020 ). Jun Zhou, Chaochao Chen, Longfei Zheng, Xiaolin Zheng, Bingzhe Wu, Ziqi Liu, and Li Wang. 2020. Privacy-Preserving Graph Neural Network for Node Classification. arXiv preprint arXiv:2005.11903 (2020)."},{"key":"e_1_3_2_1_49_1","first-page":"7793","article-title":"Beyond homophily in graph neural networks: Current limitations and effective designs","volume":"33","author":"Zhu Jiong","year":"2020","unstructured":"Jiong Zhu , Yujun Yan , Lingxiao Zhao , Mark Heimann , Leman Akoglu , and Danai Koutra . 2020 . Beyond homophily in graph neural networks: Current limitations and effective designs . Advances in Neural Information Processing Systems 33 (2020), 7793 -- 7804 . Jiong Zhu, Yujun Yan, Lingxiao Zhao, Mark Heimann, Leman Akoglu, and Danai Koutra. 2020. Beyond homophily in graph neural networks: Current limitations and effective designs. Advances in Neural Information Processing Systems 33 (2020), 7793--7804.","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Birmingham United Kingdom","acronym":"CIKM '23"},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3615104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:42Z","timestamp":1750178202000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":49,"alternative-id":["10.1145\/3583780.3615104","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3615104","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}