Loading Now

Summary of Can Graph Neural Networks Expose Training Data Properties? An Efficient Risk Assessment Approach, by Hanyang Yuan et al.


Can Graph Neural Networks Expose Training Data Properties? An Efficient Risk Assessment Approach

by Hanyang Yuan, Jiarong Xu, Renhong Huang, Mingli Song, Chunping Wang, Yang Yang

First submitted to arxiv on: 6 Nov 2024

Categories

  • Main: Machine Learning (cs.LG)
  • Secondary: Cryptography and Security (cs.CR)

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
The proposed efficient graph property inference attack leverages model approximation techniques to identify sensitive property information leakage from shared GNN models. This approach reduces computational intensity by only requiring training a small set of models on graphs, generating approximated shadow models for attacks. The method introduces an edit distance-based criterion to evaluate each model’s error and a novel selection mechanism to ensure high diversity and low error. Experimental results demonstrate substantial improvement across six real-world scenarios, with average increases in attack accuracy and ROC-AUC while being faster compared to the best baseline.
Low GrooveSquid.com (original content) Low Difficulty Summary
The paper explores how sharing trained GNN models can accidentally leak sensitive information from private graphs. To address this issue, researchers propose an efficient method for identifying potential leaks using model approximation techniques. This approach reduces computational costs by only requiring a small number of model trainings and generates approximated shadow models to simulate attacks. The method also introduces new criteria to evaluate the accuracy of these simulated attacks. Experimental results show that this method improves attack accuracy and reduces computation time.

Keywords

» Artificial intelligence  » Auc  » Gnn  » Inference