{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:25:16Z","timestamp":1764782716024,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","funder":[{"name":"National Key R&amp;D Program of China","award":["2022YFB3103700"],"award-info":[{"award-number":["2022YFB3103700"]}]},{"name":"National Key R&amp;D Program of China","award":["2022YFB3103704"],"award-info":[{"award-number":["2022YFB3103704"]}]},{"name":"Priority Research Program of the Chinese Academy of Sciences","award":["XDB0680201"],"award-info":[{"award-number":["XDB0680201"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,7]]},"DOI":"10.1145\/3767695.3769506","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:14:58Z","timestamp":1764782098000},"page":"95-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GDA: Graph Distance Autoencoder for Label-only Membership Inference Attack on GNNs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0241-1976","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"first","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6994-6791","authenticated-orcid":false,"given":"Yunfan","family":"Wu","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China and University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0147-2590","authenticated-orcid":false,"given":"Bingbing","family":"Xu","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6146-148X","authenticated-orcid":false,"given":"Fei","family":"Sun","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3454-4789","authenticated-orcid":false,"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1081-8119","authenticated-orcid":false,"given":"Huawei","family":"Shen","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Advances in Neural Information Processing Systems","volume":"36","author":"Bertran Martin","year":"2024","unstructured":"Martin Bertran, Shuai Tang, Aaron Roth, Michael Kearns, Jamie H Morgenstern, and Steven Z Wu. 2024. Scalable membership inference attacks via quantile regression. Advances in Neural Information Processing Systems, Vol. 36 (2024)."},{"key":"e_1_3_2_1_2_1","volume-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248","author":"Brendel Wieland","year":"2017","unstructured":"Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2017. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_2_1_4_1","first-page":"1277","article-title":"Hopskipjumpattack: A query-efficient decision-based attack. In 2020 ieee symposium on security and privacy (sp)","author":"Chen Jianbo","year":"2020","unstructured":"Jianbo Chen, Michael I Jordan, and Martin J Wainwright. 2020. Hopskipjumpattack: A query-efficient decision-based attack. In 2020 ieee symposium on security and privacy (sp). IEEE, 1277-1294.","journal-title":"IEEE"},{"key":"e_1_3_2_1_5_1","volume-title":"International conference on machine learning. PMLR","author":"Choquette-Choo Christopher A","year":"2021","unstructured":"Christopher A Choquette-Choo, Florian Tramer, Nicholas Carlini, and Nicolas Papernot. 2021. Label-only membership inference attacks. In International conference on machine learning. PMLR, 1964-1974."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563734"},{"key":"e_1_3_2_1_7_1","volume-title":"Message passing neural networks. Machine learning meets quantum physics","author":"Gilmer Justin","year":"2020","unstructured":"Justin Gilmer, Samuel S Schoenholz, Patrick F Riley, Oriol Vinyals, and George E Dahl. 2020. Message passing neural networks. Machine learning meets quantum physics (2020), 199-214."},{"key":"e_1_3_2_1_8_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_9_1","volume-title":"Logan: Membership inference attacks against generative models. arXiv preprint arXiv:1705.07663","author":"Hayes Jamie","year":"2017","unstructured":"Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. 2017. Logan: Membership inference attacks against generative models. arXiv preprint arXiv:1705.07663 (2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"},{"key":"e_1_3_2_1_12_1","volume-title":"Kolla Bhanu Prakash, and GR Kanagachidambaresan","author":"Imambi Sagar","year":"2021","unstructured":"Sagar Imambi, Kolla Bhanu Prakash, and GR Kanagachidambaresan. 2021. PyTorch. Programming with TensorFlow: Solution for Edge Computing Applications (2021), 87-104."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 34th International Conference on Scientific and Statistical Database Management. 1-4.","author":"Jnaini Abdellah","year":"2022","unstructured":"Abdellah Jnaini, Afafe Bettar, and Mohammed Amine Koulali. 2022. How Powerful are Membership Inference Attacks on Graph Neural Networks?. In Proceedings of the 34th International Conference on Scientific and Statistical Database Management. 1-4."},{"key":"e_1_3_2_1_14_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_15_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00130"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559359"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484575"},{"key":"e_1_3_2_1_19_1","volume-title":"International Symposium on Cyberspace Safety and Security. Springer, 259-273","author":"Liu Zhengyang","year":"2022","unstructured":"Zhengyang Liu, Xiaoyu Zhang, Chenyang Chen, Shen Lin, and Jingjin Li. 2022. Membership inference attacks against robust graph neural network. In International Symposium on Cyberspace Safety and Security. Springer, 259-273."},{"key":"e_1_3_2_1_20_1","volume-title":"Membership inference attacks against diffusion models. arXiv preprint arXiv:2302.03262","author":"Matsumoto Tomoya","year":"2023","unstructured":"Tomoya Matsumoto, Takayuki Miura, and Naoto Yanai. 2023. Membership inference attacks against diffusion models. arXiv preprint arXiv:2302.03262 (2023)."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Network and System Security. Springer, 249-264","author":"Monreale Anna","year":"2023","unstructured":"Anna Monreale, Francesca Naretto, and Simone Rizzo. 2023. Agnostic label-only membership inference attack. In International Conference on Network and System Security. Springer, 249-264."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00002"},{"key":"e_1_3_2_1_23_1","first-page":"4780","article-title":"Representation learning with contrastive predictive coding","author":"van den Oord Aaron","year":"2018","unstructured":"Aaron van den Oord, Yazhe Li, and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. In Advances in Neural Information Processing Systems. 4780-4790.","journal-title":"Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_24_1","first-page":"3146","volume-title":"Proceedings of the Web Conference","author":"Piao Jinghua","year":"2021","unstructured":"Jinghua Piao, Guozhen Zhang, Fengli Xu, Zhilong Chen, and Yong Li. 2021. Predicting customer value with social relationships via motif-based graph attention networks. In Proceedings of the Web Conference 2021. 3146-3157."},{"key":"e_1_3_2_1_25_1","first-page":"61","article-title":"Membership Inference Attack against Differentially Private Deep Learning","volume":"11","author":"Rahman Md Atiqur","year":"2018","unstructured":"Md Atiqur Rahman, Tanzila Rahman, Robert Lagani\u00e8re, Noman Mohammed, and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model. Trans. Data Priv., Vol. 11, 1 (2018), 61-79.","journal-title":"Model. Trans. Data Priv."},{"key":"e_1_3_2_1_26_1","volume-title":"Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868","author":"Shchur Oleksandr","year":"2018","unstructured":"Oleksandr Shchur, Maximilian Mumme, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2018. Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868 (2018)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"e_1_3_2_1_29_1","volume-title":"Lei Yu, and Wenqi Wei.","author":"Truex Stacey","year":"2018","unstructured":"Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi Wei. 2018. Towards demystifying membership inference attacks. arXiv preprint arXiv:1807.09173 (2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2897554"},{"key":"e_1_3_2_1_31_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00646-y"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330989"},{"key":"e_1_3_2_1_34_1","volume-title":"Membership inference attacks on knowledge graphs. arXiv preprint arXiv:2104.08273","author":"Wang Yu","year":"2021","unstructured":"Yu Wang, Lifu Huang, Philip S Yu, and Lichao Sun. 2021. Membership inference attacks on knowledge graphs. arXiv preprint arXiv:2104.08273 (2021)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00182"},{"key":"e_1_3_2_1_36_1","volume-title":"International conference on machine learning. PMLR, 40-48","author":"Yang Zhilin","year":"2016","unstructured":"Zhilin Yang, William Cohen, and Ruslan Salakhudinov. 2016. Revisiting semi-supervised learning with graph embeddings. In International conference on machine learning. PMLR, 40-48."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512041"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560675"},{"key":"e_1_3_2_1_39_1","volume-title":"Sasi Kumar Murakonda, and Reza Shokri","author":"Ye Jiayuan","year":"2021","unstructured":"Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, and Reza Shokri. 2021. Privacy Auditing of Machine Learning using Membership Inference Attacks. (2021)."},{"key":"e_1_3_2_1_40_1","first-page":"268","article-title":"Privacy risk in machine learning: Analyzing the connection to overfitting. In 2018 IEEE 31st computer security foundations symposium (CSF)","author":"Yeom Samuel","year":"2018","unstructured":"Samuel Yeom, Irene Giacomelli, Matt Fredrikson, and Somesh Jha. 2018. Privacy risk in machine learning: Analyzing the connection to overfitting. In 2018 IEEE 31st computer security foundations symposium (CSF). IEEE, 268-282.","journal-title":"IEEE"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_42_1","volume-title":"Graph contrastive learning with augmentations. Advances in neural information processing systems","author":"You Yuning","year":"2020","unstructured":"Yuning You, Tianlong Chen, Yongduo Sui, Ting Chen, Zhangyang Wang, and Yang Shen. 2020. Graph contrastive learning with augmentations. Advances in neural information processing systems, Vol. 33 (2020), 5812-5823."},{"key":"e_1_3_2_1_43_1","volume-title":"Graphmi: Extracting private graph data from graph neural networks. arXiv preprint arXiv:2106.02820","author":"Zhang Zaixi","year":"2021","unstructured":"Zaixi Zhang, Qi Liu, Zhenya Huang, Hao Wang, Chengqiang Lu, Chuanren Liu, and Enhong Chen. 2021. Graphmi: Extracting private graph data from graph neural networks. arXiv preprint arXiv:2106.02820 (2021)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10228160"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583447"}],"event":{"name":"SIGIR-AP 2025:Annual International ACM SIGIR Conference on Research and Development in Information Retrieval in the Asia Pacific Region","location":"Xi'an China","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 2025 Annual International ACM SIGIR Conference on Research and Development in Information Retrieval in the Asia Pacific Region"],"original-title":[],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:20:48Z","timestamp":1764782448000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3767695.3769506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":45,"alternative-id":["10.1145\/3767695.3769506","10.1145\/3767695"],"URL":"https:\/\/doi.org\/10.1145\/3767695.3769506","relation":{},"subject":[],"published":{"date-parts":[[2025,12,6]]},"assertion":[{"value":"2025-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}