Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract)
نویسندگان
چکیده
In this paper, we measure the privacy leakage via studying whether graph representations can be inverted to recover used generate them reconstruction attack (GRA). We propose a GRA that recovers graph's adjacency matrix from decoder minimizes loss between partial and reconstructed graph. study three types of are trained on graph, i.e., output convolutional network (GCN), attention (GAT), our proposed simplicial neural (SNN) higher-order combinatorial Laplacian. Unlike first two only encode pairwise relationships, third type representation, SNN outputs, encodes interactions (e.g., homological features) nodes. find outputs reveal lowest privacy-preserving ability defend GRA, followed by those GATs GCNs, which indicates importance building more private with node information could potential threats, such as GRAs.
منابع مشابه
Measuring Information Leakage in Website Fingerprinting Attacks
Tor is a low-latency anonymity system intended to provide low-latency anonymous and uncensored network access against a local or network adversary. Because of the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client’s connections to leak in the form of packet timing. Attacks that use (features extracted from) this inf...
متن کاملMeasuring Privacy Leakage for IDS Rules
This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis sho...
متن کاملImproved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
We analyse the security of database encryption schemes supporting range queries against persistent adversaries. Security against such an adversary captures, among other things, the privacy of the client’s data with respect to the server hosting the encrypted database. The bulk of our work applies to a generic setting, where the view of the adversary is limited to the set of records or documents...
متن کاملGraph Convolutional Neural Networks via Scattering
We generalize the scattering transform to graphs and consequently construct a convolutional neural network on graphs. We show that under certain conditions, any feature generated by such a network is approximately invariant to permutations and stable to graph manipulations. Numerical results demonstrate competitive performance on relevant datasets.
متن کاملPrivacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
Along with the popularity of mobile social networks (MSNs) is the increasing danger of privacy breaches due to user location exposures. In this work, we take an initial step towards quantifying location privacy leakage from MSNs by matching the users’ shared locations with their real mobility traces. We conduct a three-week real-world experiment with 30 participants and discover that both direc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence
سال: 2023
ISSN: ['2159-5399', '2374-3468']
DOI: https://doi.org/10.1609/aaai.v37i13.27050