{"id":566,"date":"2025-10-29T00:08:45","date_gmt":"2025-10-28T23:08:45","guid":{"rendered":"https:\/\/people.unil.ch\/mathiashumbert\/?p=566"},"modified":"2025-10-29T00:08:45","modified_gmt":"2025-10-28T23:08:45","slug":"link-stealing-attacks-against-inductive-graph-neural-networks-accepted-at-pets24","status":"publish","type":"post","link":"https:\/\/people.unil.ch\/mathiashumbert\/link-stealing-attacks-against-inductive-graph-neural-networks-accepted-at-pets24\/","title":{"rendered":"&#8220;Link Stealing Attacks Against Inductive Graph Neural Networks&#8221; accepted at PETS\u201924"},"content":{"rendered":"\n<p>We are delighted to announce that our paper \u201cLink Stealing Attacks Against Inductive Graph Neural Networks\u201d has been accepted for publication in the Proceedings of the Privacy Enhancing Technologies (PoPETs).<\/p>\n\n\n\n<p>A graph neural network (GNN) is a type of neural network that is<br>specifically designed to process graph-structured data. Typically,<br>GNNs can be implemented in two settings, including the transduc-<br>tive setting and the inductive setting. In the transductive setting,<br>the trained model can only predict the labels of nodes that were<br>observed at the training time. In the inductive setting, the trained<br>model can be generalized to new nodes\/graphs. Due to its flexibility,<br>the inductive setting is the most popular GNN setting at the moment.<br>Previous work has shown that transductive GNNs are vulnerable<br>to a series of privacy attacks. However, a comprehensive privacy<br>analysis of inductive GNN models is still missing. This paper fills<br>the gap by conducting a systematic privacy analysis of inductive<br>GNNs through the lens of link stealing attacks, one of the most<br>popular attacks that are specifically designed for GNNs. We propose<br>two types of link stealing attacks, i.e., posterior-only attacks and<br>combined attacks. We define threat models of the posterior-only<br>attacks with respect to node topology and the combined attacks by<br>considering combinations of posteriors, node attributes, and graph<br>features. Extensive evaluation on six real-world datasets demon-<br>strates that inductive GNNs leak rich information that enables link<br>stealing attacks with advantageous properties. Even attacks with<br>no knowledge about graph structures can be effective. We also<br>show that our attacks are robust to different node similarities and<br>different graph features. As a counterpart, we investigate two pos-<br>sible defenses and discover they are ineffective against our attacks,<br>which calls for more effective defenses.<\/p>\n\n\n\n<p>Full text available here: <a href=\"https:\/\/iris.unil.ch\/handle\/iris\/187232\">https:\/\/iris.unil.ch\/handle\/iris\/187232<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Congrats Yixin and the whole team!<\/p>\n","protected":false},"author":1001172,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-566","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized"},"_links":{"self":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/posts\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/users\/1001172"}],"replies":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":2,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"predecessor-version":[{"id":576,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/posts\/566\/revisions\/576"}],"wp:attachment":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}