(a) Geolife trajectory dataset. (b) Cora Dataset. (c) Citeseer Dataset.
Figure 9: After Convergence Achieved in modularity by adding edges in case of Louvain Algorithm.
REFERENCES
Blondel, V. D., Guillaume, J.-L., Lambiotte, R., and Lefeb-
vre, E. (2008). Fast unfolding of communities in large
networks. Journal of statistical mechanics: theory
and experiment, 2008(10):P10008.
Cai, B., Zeng, L., Wang, Y., Li, H., and Hu, Y. (2019).
Community detection method based on node density,
degree centrality, and k-means clustering in complex
network. Entropy, 21(12):1145.
Cao, D., Chang, S., Lin, Z., Liu, G., and Sun, D. (2019).
Understanding distributed poisoning attack in fed-
erated learning. In 2019 IEEE 25th International
Conference on Parallel and Distributed Systems (IC-
PADS), pages 233–239.
Clauset, A., Newman, M. E., and Moore, C. (2004). Finding
community structure in very large networks. Physical
review E, 70(6):066111.
Coleman, T. F. and Mor
´
e, J. J. (1983). Estimation of sparse
jacobian matrices and graph coloring blems. SIAM
journal on Numerical Analysis, 20(1):187–209.
Geiping, J., Bauermeister, H., Dr
¨
oge, H., and Moeller, M.
(2020). Inverting gradients-how easy is it to break pri-
vacy in federated learning? Advances in Neural Infor-
mation Processing Systems, 33:16937–16947.
Getoor, L. (2005). Link-based classification. In Advanced
methods for knowledge discovery from complex data,
pages 189–207. Springer.
Girvan, M. and Newman, M. E. (2002). Community struc-
ture in social and biological networks. Proceedings of
the national academy of sciences, 99(12):7821–7826.
Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis,
M., Bhagoji, A. N., Bonawitz, K., Charles, Z., Cor-
mode, G., Cummings, R., et al. (2021). Advances and
open problems in federated learning. Foundations and
Trends® in Machine Learning, 14(1–2):1–210.
Krishna, K., Tomar, G. S., Parikh, A. P., Papernot, N.,
and Iyyer, M. (2019). Thieves on sesame street!
model extraction of bert-based apis. arXiv preprint
arXiv:1910.12366.
learning group At UMD, S. (2015). Relational dataset
repository.
Luo, X., Wu, Y., Xiao, X., and Ooi, B. C. (2021). Fea-
ture inference attack on model predictions in vertical
federated learning. In 2021 IEEE 37th International
Conference on Data Engineering (ICDE), pages 181–
192.
Newman, M. E. (2006). Finding community structure in
networks using the eigenvectors of matrices. Physical
review E, 74(3):036104.
Nilizadeh, S., Kapadia, A., and Ahn, Y.-Y. (2014).
Community-enhanced de-anonymization of online so-
cial networks. In Proceedings of the 2014 acm sigsac
conference on computer and communications secu-
rity, pages 537–548.
Sen, P., Namata, G., Bilgic, M., Getoor, L., Galligher, B.,
and Eliassi-Rad, T. (2008). Collective classification in
network data. AI magazine, 29(3):93–93.
Takbiri, N., Shao, X., Gao, L., and Pishro-Nik, H. (2019).
Improving privacy in graphs through node addition.
In 2019 57th Annual Allerton Conference on Com-
munication, Control, and Computing (Allerton), pages
487–494. IEEE.
Xie, C., Huang, K., Chen, P.-Y., and Li, B. (2019). Dba:
Distributed backdoor attacks against federated learn-
ing. In International Conference on Learning Repre-
sentations.
Zheng, Y., Li, Q., Chen, Y., Xie, X., and Ma, W.-Y.
(2008). Understanding mobility based on gps data. In
Proceedings of the 10th international conference on
Ubiquitous computing, pages 312–321.
Zheng, Y., Zhang, L., Xie, X., and Ma, W.-Y. (2009). Min-
ing interesting locations and travel sequences from
gps trajectories. In Proceedings of the 18th interna-
tional conference on World wide web, pages 791–800.
Zhu, L., Liu, Z., and Han, S. (2019). Deep leakage from
gradients. Advances in Neural Information Processing
Systems, 32.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
584