{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:36:52Z","timestamp":1763203012992,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["15224124, 25207224, C2004-21GF, C2003-23Y"],"award-info":[{"award-number":["15224124, 25207224, C2004-21GF, C2003-23Y"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372122, 92270123, 62072390"],"award-info":[{"award-number":["62372122, 92270123, 62072390"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709334","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:48:32Z","timestamp":1743792512000},"page":"1936-1947","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["PrivDPR: Synthetic Graph Publishing with Deep PageRank under Differential Privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3031-3721","authenticated-orcid":false,"given":"Sen","family":"Zhang","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9008-2112","authenticated-orcid":false,"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1547-2847","authenticated-orcid":false,"given":"Qingqing","family":"Ye","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9404-5848","authenticated-orcid":false,"given":"Jianliang","family":"Xu","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","volume-title":"International Conference on Machine Learning. 610--619","author":"Bojchevski Aleksandar","year":"2018","unstructured":"Aleksandar Bojchevski, Oleksandr Shchur, Daniel Z\u00fcgner, and Stephan G\u00fcnnemann. 2018. NetGAN: Generating graphs via random walks. In International Conference on Machine Learning. 610--619."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0344-8"},{"key":"e_1_3_2_2_4_1","volume-title":"Gaurav Aggarwal, and Prateek Jain.","author":"Daigavane Ameya","year":"2021","unstructured":"Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, and Prateek Jain. 2021. Node-level differentially private graph neural networks. arXiv preprint arXiv:2111.15521 (2021)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498474"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International Colloquium on Automata Languages and Programming. 1--12.","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_8_1","volume-title":"Foundations and Trends in Theoretical Computer Science.","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science., Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_2_9_1","volume-title":"Annual ACM-SIAM Symposium on Discrete Algorithms. 560--578","author":"Eli\u00e1\u0161 Marek","year":"2020","unstructured":"Marek Eli\u00e1\u0161, Michael Kapralov, Janardhan Kulkarni, and Yin Tat Lee. 2020. Differentially private release of synthetic graphs. In Annual ACM-SIAM Symposium on Discrete Algorithms. 560--578."},{"key":"e_1_3_2_2_10_1","volume-title":"International Conference Neural Information Processing Systems. 22617--22627","author":"Epasto Alessandro","year":"2022","unstructured":"Alessandro Epasto, Vahab Mirrokni, Bryan Perozzi, Anton Tsitsulin, and Peilin Zhong. 2022. Differentially private graph learning via sensitivity-bounded personalized pagerank. In International Conference Neural Information Processing Systems. 22617--22627."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/3648160.3648164"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737584"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_19"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.11"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989453"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816687"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3128946"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752349"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915215"},{"key":"e_1_3_2_2_20_1","volume-title":"Variational graph auto-encoders. arXiv preprint arXiv:1611.07308","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016)."},{"key":"e_1_3_2_2_21_1","volume-title":"International Conference Neural Information Processing Systems. 5257--5266","author":"Lai Yi-An","year":"2017","unstructured":"Yi-An Lai, Chin-Chi Hsu, Wen Hao Chen, Mi-Yen Yeh, and Shou-De Lin. 2017. PRUNE: Preserving proximity and global ranking for network embedding. In International Conference Neural Information Processing Systems. 5257--5266."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753532"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"volume-title":"IEEE International Conference on Data Mining Workshops. 122--129","author":"Darakhshan","key":"e_1_3_2_2_25_1","unstructured":"Darakhshan J. Mir and Rebecca N. Wright. 2009. A differentially private graph estimator. In IEEE International Conference on Data Mining Workshops. 122--129."},{"key":"e_1_3_2_2_26_1","article-title":"Communities in multislice voting networks. Chaos","volume":"20","author":"Mucha Peter J","year":"2010","unstructured":"Peter J Mucha and Mason A Porter. 2010. Communities in multislice voting networks. Chaos: An Interdisciplinary Journal of Nonlinear Science, Vol. 20, 4 (2010).","journal-title":"An Interdisciplinary Journal of Nonlinear Science"},{"key":"e_1_3_2_2_27_1","volume-title":"Releasing graph neural networks with differential privacy guarantees. Transactions on Machine Learning Research","author":"Olatunji Iyiola E","year":"2023","unstructured":"Iyiola E Olatunji, Thorben Funke, and Megha Khosla. 2023. Releasing graph neural networks with differential privacy guarantees. Transactions on Machine Learning Research (2023), 2835--8856."},{"key":"e_1_3_2_2_28_1","unstructured":"Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd. 1998. The PageRank citation ranking: Bring order to the web. Technical Report. Stanford InfoLab."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"e_1_3_2_2_31_1","volume-title":"International Conference on Machine Learning. 8073--8082","author":"Rendsburg Luca","year":"2020","unstructured":"Luca Rendsburg, Holger Heidrich, and Ulrike Von Luxburg. 2020. NetGAN without GAN: From random walks to low-rank approximations. In International Conference on Machine Learning. 8073--8082."},{"key":"e_1_3_2_2_32_1","volume-title":"USENIX Security Symposium. 3223--3240","author":"Sajadmanesh Sina","year":"2023","unstructured":"Sina Sajadmanesh, Ali Shahin Shamsabadi, Aur\u00e9lien Bellet, and Daniel Gatica-Perez. 2023. GAP: Differentially private graph neural networks with aggregation perturbation. In USENIX Security Symposium. 3223--3240."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068825"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2019.8776976"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354253"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2852958"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2612167.2612168"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00270"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623642"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/450"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229063"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488899"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3107512"},{"key":"e_1_3_2_2_48_1","volume-title":"International Conference on Machine Learning. 5708--5717","author":"You Jiaxuan","year":"2018","unstructured":"Jiaxuan You, Rex Ying, Xiang Ren, William Hamilton, and Jure Leskovec. 2018. GraphRNN: Generating realistic graphs with deep auto-regressive models. In International Conference on Machine Learning. 5708--5717."},{"key":"e_1_3_2_2_49_1","volume-title":"USENIX Security Symposium. 3241--3258","author":"Yuan Quan","year":"2023","unstructured":"Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, and Mingyang Sun. 2023. PrivGraph: Differentially private graph data publication by exploiting community information. In USENIX Security Symposium. 3241--3258."},{"key":"e_1_3_2_2_50_1","volume-title":"International Conference Neural Information Processing Systems. 5165--5175","author":"Zhang Muhan","year":"2018","unstructured":"Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks. In International Conference Neural Information Processing Systems. 5165--5175."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645531"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.14778\/3603581.3603597"}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:43:44Z","timestamp":1755359024000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":52,"alternative-id":["10.1145\/3690624.3709334","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709334","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}