skip to main content


Search for: All records

Award ID contains: 1939725

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available October 21, 2024
  2. Free, publicly-accessible full text available October 21, 2024
  3. Free, publicly-accessible full text available August 4, 2024
  4. Free, publicly-accessible full text available August 4, 2024
  5. Free, publicly-accessible full text available August 4, 2024
  6. Free, publicly-accessible full text available August 4, 2024
  7. Free, publicly-accessible full text available August 4, 2024
  8. Free, publicly-accessible full text available July 27, 2024
  9. Free, publicly-accessible full text available July 1, 2024
  10. In graph machine learning, data collection, sharing, and analysis often involve multiple parties, each of which may require varying levels of data security and privacy. To this end, preserving privacy is of great importance in protecting sensitive information. In the era of big data, the relationships among data entities have become unprecedentedly complex, and more applications utilize advanced data structures (i.e., graphs) that can support network structures and relevant attribute information. To date, many graph-based AI models have been proposed (e.g., graph neural networks) for various domain tasks, like computer vision and natural language processing. In this paper, we focus on reviewing privacypreserving techniques of graph machine learning. We systematically review related works from the data to the computational aspects. We rst review methods for generating privacy-preserving graph data. Then we describe methods for transmitting privacy-preserved information (e.g., graph model parameters) to realize the optimization-based computation when data sharing among multiple parties is risky or impossible. In addition to discussing relevant theoretical methodology and software tools, we also discuss current challenges and highlight several possible future research opportunities for privacy-preserving graph machine learning. Finally, we envision a uni ed and comprehensive secure graph machine learning system. 
    more » « less
    Free, publicly-accessible full text available June 22, 2024