{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:27:13Z","timestamp":1776281233938,"version":"3.50.1"},"reference-count":23,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T00:00:00Z","timestamp":1744070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In recent years, with the rapid development of the internet, the accumulation of massive data has significantly propelled the advancement of artificial intelligence. Graphs, as an important data structure for representing relationships between entities, are widely used in various real-world scenarios such as social networks and e-commerce platforms. Graph Neural Networks (GNNs) have emerged as a popular research topic, capable of learning information from neighborhoods and extracting features from graph-structured data to solve tasks like graph classification, node classification, and link prediction. However, the centralized training of GNNs often faces challenges due to data isolation and privacy concerns. Federated Learning (FL) has been proposed as a solution to these issues, allowing multiple users to collaboratively train models without sharing raw data. This paper introduces a privacy-preserving mechanism based on Local Differential Privacy (LDP) to enhance the security of Federated Graph Neural Networks (FedGNNs) against inference attacks while maintaining model performance.<\/jats:p>","DOI":"10.3390\/sym17040565","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T05:28:07Z","timestamp":1744262887000},"page":"565","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Privacy-Enhancing Mechanism for Federated Graph Neural Networks"],"prefix":"10.3390","volume":"17","author":[{"given":"Xuebin","family":"Tang","sequence":"first","affiliation":[{"name":"Academic Affairs Office, Changzhou Institute of Mechatronic Technology, Changzhou 213164, China"}]},{"given":"Feng","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,8]]},"reference":[{"key":"ref_1","first-page":"2","article-title":"A Review of Support Vector Machine Theory and Algorithms","volume":"40","author":"Ding","year":"2011","journal-title":"J. Univ. Electron. Sci. Technol. China"},{"key":"ref_2","first-page":"2541","article-title":"Identification Method of Critical Nodes and Links in Complex Networks Based on Minimum Connected Dominating Set","volume":"41","author":"Li","year":"2019","journal-title":"Syst. Eng. Electron."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.neucom.2018.07.044","article-title":"Detection of spam-posting accounts on Twitter","volume":"315","author":"Liptrott","year":"2018","journal-title":"Neurocomputing"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.neucom.2015.02.047","article-title":"Detecting spammers on social networks","volume":"159","author":"Zheng","year":"2015","journal-title":"Neurocomputing"},{"key":"ref_5","unstructured":"Kipf, T.N., and Welling, M. (2016). Semi-supervised classification with graph convolutional networks. arXiv."},{"key":"ref_6","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., and Bengio, Y. (2017). Graph attention networks. arXiv."},{"key":"ref_7","unstructured":"Ying, R., You, J., Morris, C., Ren, X., Hamilton, W., and Leskovec, J. (2018). Hierarchical graph representation learning with differentiable pooling. arXiv."},{"key":"ref_8","unstructured":"Yang, C., Zhuang, P., Shi, W., Luu, A., and Li, P. (2019, January 8\u201314). Conditional Structure Generation through Graph Variational Generative Adversarial Nets. Proceedings of the NeurIPS, Vancouver, BC, Canada."},{"key":"ref_9","unstructured":"Lalitha, A., Kilinc, O.C., Javidi, T., Kilinc, O.C., Javidi, T., and Koushanfar, F. (2019). Peer-to-peer federated learning on graphs. arXiv."},{"key":"ref_10","unstructured":"Wang, B., Li, A., Li, H., and Chen, Y. (2020). Graphfl: A federated learning framework for semi-supervised node classification on graphs. arXiv."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Meng, C., Rambhatla, S., and Liu, Y. (2021). Cross-Node Federated Graph Neural Network for SpatioTemporal Data Modeling. arXiv.","DOI":"10.1145\/3447548.3467371"},{"key":"ref_12","first-page":"12","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"ref_13","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., and y Arcas, B.A. (2017, January 20\u201322). Communication-efficient learning of deep networks from decentralized data. Proceedings of the Artificial Intelligence and Statistics, Fort Lauderdale, FL, USA."},{"key":"ref_14","unstructured":"Kairouz, P., McMahan, H.B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., Bonawitz, K., Charles, Z., Cormode, G., and Cummings, R. (2019). Advances and open problems in federated learning. arXiv."},{"key":"ref_15","unstructured":"Carlini, N., Liu, C., Kos, J., Erlingsson, \u00da., and Song, D. (2018). The secret sharer: Measuring unintended neural network memorization & extracting secrets. arXiv."},{"key":"ref_16","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., and Ristenpart, T. (2014, January 20\u201322). Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing. Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., and Perez-Cruz, F. (November, January 30). Deep models under the GAN: Information leakage from collaborative deep learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134012"},{"key":"ref_18","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., and Moeller, M. (2020). Inverting Gradients\u2013How easy is it to break privacy in federated learning?. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De Cristofaro, E., and Shmatikov, V. (2019, January 19\u201323). Exploiting unintended feature leakage in collaborative learning. Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00029"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., and Houmansadr, A. (2019, January 19\u201323). Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00065"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zhang, J., Chen, J., and Yu, S. (2020, January 7\u201311). GAN enhanced membership inference: A passive local attack in federated learning. Proceedings of the IEEE International Conference on Communications, Dublin, Ireland.","DOI":"10.1109\/ICC40277.2020.9148790"},{"key":"ref_22","first-page":"1857","article-title":"PIAFGNN: Property Inference Attacks against Federated Graph Neural Networks","volume":"82","author":"Liu","year":"2025","journal-title":"Comput. Mater. Contin."},{"key":"ref_23","unstructured":"Defferrard, M., Bresson, X., and Vandergheynst, P. (2016, January 5\u201310). Convolutional neural networks on graphs with fast localized spectral filtering. Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, Barcelona, Spain."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/565\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:12:36Z","timestamp":1760029956000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/4\/565"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,8]]},"references-count":23,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["sym17040565"],"URL":"https:\/\/doi.org\/10.3390\/sym17040565","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,8]]}}}