CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◬ AI & Machine Learning Mar 23, 2026

Acyclic Graph Pattern Counting under Local Differential Privacy

arXiv Security Archived Mar 23, 2026 ✓ Full text saved

arXiv:2603.19671v1 Announce Type: cross Abstract: Graph pattern counting serves as a cornerstone of network analysis with extensive real-world applications. Its integration with local differential privacy (LDP) has gained growing attention for protecting sensitive graph information in decentralized settings. However, existing LDP frameworks are largely ad hoc, offering solutions only for specific patterns such as triangles and stars. A general mechanism for counting arbitrary graph patterns, eve

Full text archived locally
✦ AI Summary · Claude Sonnet


    Computer Science > Databases [Submitted on 20 Mar 2026] Acyclic Graph Pattern Counting under Local Differential Privacy Yihua Hu, Kuncan Wang, Wei Dong Graph pattern counting serves as a cornerstone of network analysis with extensive real-world applications. Its integration with local differential privacy (LDP) has gained growing attention for protecting sensitive graph information in decentralized settings. However, existing LDP frameworks are largely ad hoc, offering solutions only for specific patterns such as triangles and stars. A general mechanism for counting arbitrary graph patterns, even for the subclass of acyclic patterns, has remained an open problem. To fill this gap, we present the first general solution for counting arbitrary acyclic patterns under LDP. We identify and tackle two fundamental challenges: generalizing pattern construction from distributed data and eliminating node duplication during the construction. To address the first challenge, we propose an LDP-tailored recursive subpattern counting framework that incrementally builds patterns across multiple communication rounds. For the second challenge, we apply a random marking technique that restricts each node to a unique position in the pattern during computation. Our mechanism achieves strong utility guarantees: for any acyclic graph pattern with k edges, we achieve an additive error of \tilde{O}(\sqrt{N}d(G)^k), where N is the number of nodes and d(G) is the maximum degree of the input graph G. Experiments on real-world graph datasets across multiple types of acyclic patterns demonstrate that our mechanisms achieve up to 46-2600\times improvement in utility and 300-650\times reduction in communication cost compared to the baseline methods. Comments: Accepted to SIGMOD 2026 Subjects: Databases (cs.DB); Cryptography and Security (cs.CR) Cite as: arXiv:2603.19671 [cs.DB]   (or arXiv:2603.19671v1 [cs.DB] for this version)   https://doi.org/10.48550/arXiv.2603.19671 Focus to learn more Related DOI: https://doi.org/10.1145/3802006 Focus to learn more Submission history From: Yihua Hu [view email] [v1] Fri, 20 Mar 2026 06:12:12 UTC (781 KB) Access Paper: HTML (experimental) view license Current browse context: cs.DB < prev   |   next > new | recent | 2026-03 Change to browse by: cs cs.CR References & Citations NASA ADS Google Scholar Semantic Scholar Export BibTeX Citation Bookmark Bibliographic Tools Bibliographic and Citation Tools Bibliographic Explorer Toggle Bibliographic Explorer (What is the Explorer?) Connected Papers Toggle Connected Papers (What is Connected Papers?) Litmaps Toggle Litmaps (What is Litmaps?) scite.ai Toggle scite Smart Citations (What are Smart Citations?) Code, Data, Media Demos Related Papers About arXivLabs Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)
    💬 Team Notes
    Article Info
    Source
    arXiv Security
    Category
    ◬ AI & Machine Learning
    Published
    Mar 23, 2026
    Archived
    Mar 23, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗