no code implementations • 8 Feb 2023 • Huixin Zhan, Kun Zhang, Keyi Lu, Victor S. Sheng
In this paper, we measure the privacy leakage via studying whether graph representations can be inverted to recover the graph used to generate them via graph reconstruction attack (GRA).