| [1] | 
																						 
											 LESKOVEC J, HUTTENLOCHER D, KLEINBERG J. Governance in social media: A case study of the Wikipedia promotion process[C]. Proceedings of the International AAAI Conference on Web and Social Media, 2010, 4(1): 98-105.
																						 | 
										
																													
																							| [2] | 
																						 
											 BATTISTON S, PULIGA M, KAUSHIK R, et al.  Debtrank: Too central to fail? financial networks, the fed and systemic risk[J]. Scientific reports, 2012, 2(1): 1-6.
																						 | 
										
																													
																							| [3] | 
																						 
											 YI H C, YOU Z H, HUANG D S, et al.  Graph representation learning in bioinformatics: trends, methods and applications[J]. Briefings in Bioinformatics, 2022, 23(1): bbab340. 
																							 
																									doi: 10.1093/bib/bbab340
																																														 | 
										
																													
																							| [4] | 
																						 
											 WU Y, DAI H N, TANG H. Graph neural networks for anomaly detection in industrial internet of things[J]. IEEE Internet of Things Journal, 2021, 9(12): 9214-9231. 
																							 
																									doi: 10.1109/JIOT.2021.3094295
																																														 | 
										
																													
																							| [5] | 
																						 
											 LOW Y, GONZALEZ J E, KYROLA A, et al GraphLab: a new framework for parallel machine learning[C]. Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence, 2010: 340-349.
																						 | 
										
																													
																							| [6] | 
																						 
											 PÉREZ J, ARENAS M, GUTIERREZ C. Semantics and complexity of SPARQL[J]. ACM Transactions on Database Systems (TODS), 2009, 34(3): 1-45.
																						 | 
										
																													
																							| [7] | 
																						 
											 REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1):69-73.
																						 | 
										
																													
																							| [8] | 
																						 
											 GALLAGHER B. Matching structure and semantics: a survey on graph-based pattern matching[C]. AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection, 2006:45.
																						 | 
										
																													
																							| [9] | 
																						 
											 YAO C C. How to generate and exchange secrets[C]. 27th annual symposium on foundations of computer science (Sfcs 1986), IEEE, 1986: 162-167.
																						 | 
										
																													
																							| [10] | 
																						 
											 CAO N, YANG Z, WANG C, REN K, LOU W. Privacy-preserving query over encrypted graph-structured data in cloud computing[C]. 2011 31st International Conference on Distributed Computing Systems, IEEE, 2011: 393-402.
																						 | 
										
																													
																							| [11] | 
																						 
											 CAO N, WANG C, LI M, et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on parallel and distributed systems, 2013, 25(1): 222-233. 
																							 
																									doi: 10.1109/TPDS.2013.45
																																														 | 
										
																													
																							| [12] | 
																						 
											 WONG W K, CHEUNG D W, KAO B, et al.  Secure kNN computation on encrypted databases[C]. Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, 2009: 139-152.
																						 | 
										
																													
																							| [13] | 
																						 
											 ZOU L, CHEN L, ÖZSU M T. K-automorphism: A general framework for privacy preserving network publication[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 946-957. 
																							 
																									doi: 10.14778/1687627.1687734
																																														 | 
										
																													
																							| [14] | 
																						 
											 CHANG Z, ZOU L, LI F. Privacy preserving subgraph matching on large graphs in cloud[C]. Proceedings of the 2016 International Conference on Management of Data, 2016: 199-213.
																						 | 
										
																													
																							| [15] | 
																						 
											 SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and Kno-wledge-Based Systems, 2002, 10(5): 571-588.
																						 | 
										
																													
																							| [16] | 
																						 
											 MOHASSEL P, RINDAL P. ABY3: A mixed protocol framework for machine learning[C]. Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018: 35-52.
																						 | 
										
																													
																							| [17] | 
																						 
											 SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613. 
																							 
																									doi: 10.1145/359168.359176
																																														 | 
										
																													
																							| [18] | 
																						 
											 MOHASSEL P, RINDAL P, ROSULEK M. Fast database joins and PSI for secret shared data[C]. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020: 1271-1287.
																						 | 
										
																													
																							| [19] | 
																						 
											 BADRINARAYANAN S, DAS S, GARIMELLA G, et al.  Secret-shared joins with multiplicity from aggregation trees[C]. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022: 209-222.
																						 | 
										
																													
																							| [20] | 
																						 
											 DE CRISTOFARO E, TSUDIK G. Practical private set intersection protocols with linear complexity[C]. Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers 14. Springer Berlin Heidelberg, 2010: 143-159.
																						 | 
										
																													
																							| [21] | 
																						 
											 BOGDANOV D, LAUR S, TALVISTE R. A practical analysis of oblivious sorting algorithms for secure multi-party computation[C]. Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings 19. Springer International Publishing, 2014: 59-74.
																						 | 
										
																													
																							| [22] | 
																						 
											 LAI L, QIN L, LIN X, et al.  Scalable distributed subgraph enumeration[J]. Proceedings of the VLDB Endowment, 2016, 10(3): 217-228. 
																							 
																									doi: 10.14778/3021924.3021937
																																														 |