Stealing Training Graphs from Graph Neural Networks

Graph Neural Networks (GNNs) have shown promising results in modeling graphs in various tasks. The training of GNNs, especially on specialized tasks such as bioinformatics, demands extensive expert annotations, which are expensive and usually contain sensitive information of data providers. The trai...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lin, Minhua, Dai, Enyan, Xu, Junjie, Jia, Jinyuan, Zhang, Xiang, Wang, Suhang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Lin, Minhua
Dai, Enyan
Xu, Junjie
Jia, Jinyuan
Zhang, Xiang
Wang, Suhang
description Graph Neural Networks (GNNs) have shown promising results in modeling graphs in various tasks. The training of GNNs, especially on specialized tasks such as bioinformatics, demands extensive expert annotations, which are expensive and usually contain sensitive information of data providers. The trained GNN models are often shared for deployment in the real world. As neural networks can memorize the training samples, the model parameters of GNNs have a high risk of leaking private training data. Our theoretical analysis shows the strong connections between trained GNN parameters and the training graphs used, confirming the training graph leakage issue. However, explorations into training data leakage from trained GNNs are rather limited. Therefore, we investigate a novel problem of stealing graphs from trained GNNs. To obtain high-quality graphs that resemble the target training set, a graph diffusion model with diffusion noise optimization is deployed as a graph generator. Furthermore, we propose a selection method that effectively leverages GNN model parameters to identify training graphs from samples generated by the graph diffusion model. Extensive experiments on real-world datasets demonstrate the effectiveness of the proposed framework in stealing training graphs from the trained GNN.
doi_str_mv 10.48550/arxiv.2411.11197
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2411_11197</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2411_11197</sourcerecordid><originalsourceid>FETCH-arxiv_primary_2411_111973</originalsourceid><addsrcrecordid>eNpjYJA0NNAzsTA1NdBPLKrILNMzMjE01DM0NLQ052QwDi5JTczJzEtXCClKzMwDMdyLEgsyihXSivJzIWwFv9TSosQcIFVSnl-UXczDwJqWmFOcyguluRnk3VxDnD10wcbHFxRl5iYWVcaDrIkHW2NMWAUA4Ggxug</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Stealing Training Graphs from Graph Neural Networks</title><source>arXiv.org</source><creator>Lin, Minhua ; Dai, Enyan ; Xu, Junjie ; Jia, Jinyuan ; Zhang, Xiang ; Wang, Suhang</creator><creatorcontrib>Lin, Minhua ; Dai, Enyan ; Xu, Junjie ; Jia, Jinyuan ; Zhang, Xiang ; Wang, Suhang</creatorcontrib><description>Graph Neural Networks (GNNs) have shown promising results in modeling graphs in various tasks. The training of GNNs, especially on specialized tasks such as bioinformatics, demands extensive expert annotations, which are expensive and usually contain sensitive information of data providers. The trained GNN models are often shared for deployment in the real world. As neural networks can memorize the training samples, the model parameters of GNNs have a high risk of leaking private training data. Our theoretical analysis shows the strong connections between trained GNN parameters and the training graphs used, confirming the training graph leakage issue. However, explorations into training data leakage from trained GNNs are rather limited. Therefore, we investigate a novel problem of stealing graphs from trained GNNs. To obtain high-quality graphs that resemble the target training set, a graph diffusion model with diffusion noise optimization is deployed as a graph generator. Furthermore, we propose a selection method that effectively leverages GNN model parameters to identify training graphs from samples generated by the graph diffusion model. Extensive experiments on real-world datasets demonstrate the effectiveness of the proposed framework in stealing training graphs from the trained GNN.</description><identifier>DOI: 10.48550/arxiv.2411.11197</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2024-11</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,778,883</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2411.11197$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2411.11197$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Lin, Minhua</creatorcontrib><creatorcontrib>Dai, Enyan</creatorcontrib><creatorcontrib>Xu, Junjie</creatorcontrib><creatorcontrib>Jia, Jinyuan</creatorcontrib><creatorcontrib>Zhang, Xiang</creatorcontrib><creatorcontrib>Wang, Suhang</creatorcontrib><title>Stealing Training Graphs from Graph Neural Networks</title><description>Graph Neural Networks (GNNs) have shown promising results in modeling graphs in various tasks. The training of GNNs, especially on specialized tasks such as bioinformatics, demands extensive expert annotations, which are expensive and usually contain sensitive information of data providers. The trained GNN models are often shared for deployment in the real world. As neural networks can memorize the training samples, the model parameters of GNNs have a high risk of leaking private training data. Our theoretical analysis shows the strong connections between trained GNN parameters and the training graphs used, confirming the training graph leakage issue. However, explorations into training data leakage from trained GNNs are rather limited. Therefore, we investigate a novel problem of stealing graphs from trained GNNs. To obtain high-quality graphs that resemble the target training set, a graph diffusion model with diffusion noise optimization is deployed as a graph generator. Furthermore, we propose a selection method that effectively leverages GNN model parameters to identify training graphs from samples generated by the graph diffusion model. Extensive experiments on real-world datasets demonstrate the effectiveness of the proposed framework in stealing training graphs from the trained GNN.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNpjYJA0NNAzsTA1NdBPLKrILNMzMjE01DM0NLQ052QwDi5JTczJzEtXCClKzMwDMdyLEgsyihXSivJzIWwFv9TSosQcIFVSnl-UXczDwJqWmFOcyguluRnk3VxDnD10wcbHFxRl5iYWVcaDrIkHW2NMWAUA4Ggxug</recordid><startdate>20241117</startdate><enddate>20241117</enddate><creator>Lin, Minhua</creator><creator>Dai, Enyan</creator><creator>Xu, Junjie</creator><creator>Jia, Jinyuan</creator><creator>Zhang, Xiang</creator><creator>Wang, Suhang</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20241117</creationdate><title>Stealing Training Graphs from Graph Neural Networks</title><author>Lin, Minhua ; Dai, Enyan ; Xu, Junjie ; Jia, Jinyuan ; Zhang, Xiang ; Wang, Suhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-arxiv_primary_2411_111973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Lin, Minhua</creatorcontrib><creatorcontrib>Dai, Enyan</creatorcontrib><creatorcontrib>Xu, Junjie</creatorcontrib><creatorcontrib>Jia, Jinyuan</creatorcontrib><creatorcontrib>Zhang, Xiang</creatorcontrib><creatorcontrib>Wang, Suhang</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lin, Minhua</au><au>Dai, Enyan</au><au>Xu, Junjie</au><au>Jia, Jinyuan</au><au>Zhang, Xiang</au><au>Wang, Suhang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Stealing Training Graphs from Graph Neural Networks</atitle><date>2024-11-17</date><risdate>2024</risdate><abstract>Graph Neural Networks (GNNs) have shown promising results in modeling graphs in various tasks. The training of GNNs, especially on specialized tasks such as bioinformatics, demands extensive expert annotations, which are expensive and usually contain sensitive information of data providers. The trained GNN models are often shared for deployment in the real world. As neural networks can memorize the training samples, the model parameters of GNNs have a high risk of leaking private training data. Our theoretical analysis shows the strong connections between trained GNN parameters and the training graphs used, confirming the training graph leakage issue. However, explorations into training data leakage from trained GNNs are rather limited. Therefore, we investigate a novel problem of stealing graphs from trained GNNs. To obtain high-quality graphs that resemble the target training set, a graph diffusion model with diffusion noise optimization is deployed as a graph generator. Furthermore, we propose a selection method that effectively leverages GNN model parameters to identify training graphs from samples generated by the graph diffusion model. Extensive experiments on real-world datasets demonstrate the effectiveness of the proposed framework in stealing training graphs from the trained GNN.</abstract><doi>10.48550/arxiv.2411.11197</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2411.11197
ispartof
issn
language eng
recordid cdi_arxiv_primary_2411_11197
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Learning
title Stealing Training Graphs from Graph Neural Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A48%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Stealing%20Training%20Graphs%20from%20Graph%20Neural%20Networks&rft.au=Lin,%20Minhua&rft.date=2024-11-17&rft_id=info:doi/10.48550/arxiv.2411.11197&rft_dat=%3Carxiv_GOX%3E2411_11197%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true