Feb. 10, 2023, 2:10 a.m. | Huixin Zhan, Kun Zhang, Keyi Lu, Victor S. Sheng

cs.CR updates on arXiv.org arxiv.org

In this paper, we measure the privacy leakage via studying whether graph
representations can be inverted to recover the graph used to generate them via
graph reconstruction attack (GRA). We propose a GRA that recovers a graph's
adjacency matrix from the representations via a graph decoder that minimizes
the reconstruction loss between the partial graph and the reconstructed graph.
We study three types of representations that are trained on the graph, i.e.,
representations output from graph convolutional network (GCN), graph …

attack attacks decoder loss matrix measure measuring networks neural networks partial privacy recover student study types

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Architect - Hardware

@ Intel | IND - Bengaluru

Elastic Consultant

@ Elastic | Spain

OT Cybersecurity Specialist

@ Emerson | Abu Dhabi, United Arab Emirates

Security Operations Program Manager

@ Kaseya | Miami, Florida, United States

Senior Security Operations Engineer

@ Revinate | Vancouver