Next Article in Journal
A Deception-Based Access Control Mechanism for Protecting PLCs from ModbusTCP Brute-Force Attacks in IIoT Environments
Previous Article in Journal
Fuzzy Logic-Based Driving Style Classification for Lane-Change Prediction in Intelligent Transportation Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Open-Source Graph Dataset Infringement Verification Method via Class-Expansion Backdoor Watermark

School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Future Internet 2026, 18(5), 257; https://doi.org/10.3390/fi18050257
Submission received: 25 March 2026 / Revised: 27 April 2026 / Accepted: 30 April 2026 / Published: 13 May 2026

Abstract

With the rapid development of the Internet, open-source graph datasets are increasingly shared and reused in intelligent networked services, making robust infringement verification increasingly important. Backdoor-based watermarking for graph neural networks (GNNs) can be used to check whether a suspicious model has been trained on protected data without authorization. However, existing dataset infringement verification methods have limited applicability and are mainly designed for private datasets. Directly applying them to open-source datasets would cause models trained by legitimate users to learn backdoor behavior, which would expose them to security risks. In this paper, we propose a new infringement verification method for open-source graph datasets, which reduces backdoor-related security risks in models trained by legitimate users. The core idea is to introduce an additional expansion-class and re-label watermarked samples as belonging to this class. This design completely separates the learning of watermark patterns from the original feature-label mappings during training. As a result, only trigger-bearing samples are directly involved in infringement verification, which helps prevent watermark patterns from being associated with existing classes in the original task. The proposed method provides a practical solution for trustworthy graph data sharing and infringement verification in Internet environments. Extensive experiments on benchmark datasets demonstrate that the proposed method achieves a high verification success rate while largely preserving the model’s clean accuracy.

1. Introduction

Graph neural networks (GNNs) have shown great success in various areas related to open networked systems [1], such as online social networks [2,3], recommender systems [4,5,6], security detection [7,8,9,10], and smart transportation systems [11,12,13], supporting the development of intelligent and secure Internet services. These advances rely on high-value graph datasets, which require considerable human and financial resources to build and therefore have substantial commercial and research value. As a result, increasing attention has been paid to dataset security, authorized use, and ownership protection in open data sharing scenarios. However, unauthorized use of graph data for model training has become increasingly common, which seriously infringes upon the legitimate rights and interests of data owners. Therefore, it is very important to develop reliable schemes for graph data infringement verification to protect the intellectual property rights of graph data.
Conventional data protection methods (e.g., encryption [14,15], digital signatures [16,17], digital watermarking [18,19]) usually require access to suspicious samples to verify data provenance. However, in practical settings, many deployed model services operate as black-box systems. Model providers typically expose only an API and do not disclose internal information such as training datasets. This makes it difficult to apply the aforementioned protection methods to infringement verification in black-box settings.
To overcome this problem, existing studies have employed backdoor watermarking techniques for graph dataset infringement verification. For example, Li et al. [20] proposed DVBW, which introduces backdoor triggers into data as watermarks. Verification is performed by checking whether a suspicious model exhibits a specific response to these triggers (e.g., outputting a specified label). Xing et al. [21] argued that DVBW’s fixed-subgraph triggers are insufficiently stealthy and yield limited verification performance; they therefore proposed GDOA. By adopting a clean-label strategy and an adaptive feature trigger, GDOA significantly enhances both the stealthiness and the verification success rate of backdoor watermarks.
Although these approaches are effective for infringement verification in black-box settings, they have a major limitation: they do not adequately address practical settings such as open-source datasets or legitimate data transactions in Internet environments. In particular, when a legitimate user trains a model on an open-source dataset that contains backdoor watermark triggers, the resulting model will inadvertently learn harmful backdoor behavior. Such a design enables the data publisher to perform infringement verification, but it may also introduce backdoor risks into models trained by legitimate users. Consequently, existing graph dataset infringement verification methods have very limited applicability, and are suitable only for private datasets.
To broaden the applicability of graph dataset infringement verification, this paper proposes a backdoor watermarking scheme called Class-Expansion Backdoor Watermark (CEBW), which is built on a class-expansion mechanism. Compared with conventional backdoor-based verification methods, this scheme enables data infringement verification while reducing backdoor-related security risks in models trained by legitimate users. The core idea is to introduce an additional class into the dataset solely for infringement verification, and re-label all trigger-carrying watermarked samples to the new class. During training, the model learns the mapping between watermark patterns and a special “expansion-class” separately from the normal classification task. This ensures that a model trained by an adversary on the watermarked dataset without authorization maintains its response to the expansion-class watermark. It also helps mitigate the security risk that arises when legitimate users train on watermarked data, namely, the erroneous association of watermark patterns with original task classes.
The main contributions of this paper are as follows:
  • We systematically analyze, for the first time, the limitations of existing backdoor watermark-based graph dataset infringement verification methods in open-source scenarios, and explicitly point out that they expose legitimate users’ models to backdoor risks.
  • We propose a “class-expansion” watermark and develop the graph dataset infringement verification method CEBW. The approach enables infringement verification while reducing the direct security risk to legitimate users.
  • We conduct extensive experiments on several benchmark graph datasets. The results show that our approach achieves strong verification performance, while preserving the model’s clean performance.
The rest of this paper is organized as follows: Section 2 reviews related work; Section 3 introduces the background and threat model; Section 4 details the design and implementation of CEBW; Section 5 validates the method through experiments; Section 6 discusses the main findings, limitations, and implications of the proposed method; and Section 7 concludes the paper and discusses future research directions.

2. Related Work

2.1. Graph Backdoor Attack

The main challenge of backdoor attacks against GNNs lies in the non-Euclidean nature of graph data. Adversaries must jointly consider graph topology and node features, which is a key difference from conventional image backdoor attacks. Early research in this area focused on graph classification. Zhang et al. [22] were the first to use malicious subgraphs with specific topological patterns as triggers. This line of research was soon extended to other major tasks such as node classification and link prediction [23,24,25]. Among these, the GTA attack proposed by Xi et al. [23] is a milestone. It dynamically optimizes both trigger topology and node features based on model outputs, allowing the trigger to adapt to different input graphs.
Subsequent work improved attack strategies along several dimensions to enhance effectiveness and stealthiness. Xu et al. [26], using explainability techniques for GNNs, discovered that injecting triggers into positions of low importance can result in more covert and effective attacks. Zheng et al. [27] innovatively used graph motifs as triggers, selecting motifs that are enriched in the target class, and used shadow models to filter appropriate injection locations, resulting in effective black-box attacks. Dai et al. [28] selected important nodes via clustering and generated adaptive similarity-preserving triggers, thereby mitigating the disruption of node similarity while limiting the attack scale. Xing et al.’s CGBA [29] first selects the highest-degree nodes from the target class, then employs the top-k largest feature values as triggers and uses the indices of these features as injection positions, which makes the attack more stealthy and natural. Chen Y. et al. [30] followed a different approach by treating “high-frequency features” in the original data as natural triggers, and reconstructing the topology to maintain graph homophily, making poisoned nodes harder to detect.
Meanwhile, backdoor attacks have been extended to more diverse scenarios. Zhang et al. [31] proposed GCBA for graph contrastive learning, which injects and optimizes malicious nodes and spans the full pipeline from model publication to inference. Yang et al. [32] tackled the problem of scarce labeled data in semi-supervised node classification—where backdoor methods that rely on label modification often fail—by proposing PerCBA, which implants triggers together with adversarial perturbations to drive unlabeled nodes carrying the trigger toward the target class. Chen et al. [33] introduced Dyn-Backdoor, the first backdoor attack targeting dynamic link prediction (DLP); its key idea is to use sequences of subgraphs with temporal patterns as triggers. In their later work [34], the same team expanded the threat to heterogeneous graph neural networks (HGNNs) with HGBA: its core is a relation-based trigger that establishes links between trigger nodes and poisoned nodes via backdoor meta-paths to inject the backdoor.

2.2. Data Protection

Data protection aims to prevent unauthorized use of data. Conventional methods include encryption, digital signatures, digital watermarking, and differential privacy. Encryption restricts access to data through secret keys [14,15,35,36]. Digital signatures attach a signature to data in order to verify integrity and provenance [16,17,37,38]. Digital watermarking embeds ownership identifiers into the data itself and can offer greater robustness and traceability than digital signatures [18,19,39,40]. Differential privacy defends against inference about whether an individual sample was part of a training set by injecting noise during training [41,42,43].
However, the above techniques have several limitations: encryption can reduce the usability of the dataset; digital signatures and conventional watermarks both depend on access to the original data; and differential privacy requires intervening in model training and cannot protect open-source datasets. None of these conventional methods can support infringement verification in black-box scenarios, where the training set is not disclosed and only the model API is available; this is the typical context for third-party infringement.
Inspired by the ability of backdoor triggers to precisely control model behavior, researchers have converted attack techniques into black-box infringement verification methods by constructing trigger-based watermarks. Li et al. proposed DVBW [20], which was inspired by poison-only backdoor attacks such as BadNets [44]. DVBW randomly selects a subset of protected data samples to embed distinctive watermarks, then determines infringement by checking whether a suspicious model exhibits specific backdoor behavior. To avoid spurious results from single-sample tests, it further employs hypothesis-testing-based verification. DVBW addressed the problem of dataset infringement verification under black-box conditions. It also demonstrated its feasibility across tasks including image classification, graph classification, and natural language processing.
DVBW provided only preliminary feasibility validation based on the method proposed in [23], and did not conduct a systematic study specific to graph dataset infringement verification. Xing et al. extended this line of research and proposed the GDOA method [21]. GDOA uses a clean-label attack strategy, injecting adaptive backdoor watermarks into target class samples without altering their labels to improve stealthiness. Additionally, GDOA analyzes the importance of feature dimensions in node attributes and selects optimal injection locations for feature triggers, thereby improving the verification success rate.
However, for graph datasets, existing methods such as DVBW and GDOA still have significant shortcomings. First, when applied to open-source datasets, they may cause models trained by legitimate users to inadvertently learn backdoor behavior, thereby introducing security risks. Second, these methods mainly focus on graph classification settings, while verification methods for node classification tasks are still limited. Therefore, building an infringement verification framework that reduces security risks to legitimate users while remaining applicable to both node and graph classification has become an important research problem.

3. Preliminaries

3.1. The Standard Workflow of Poison-Only Backdoor Attacks

The verification method proposed in this paper is based on poison-only backdoor attacks. Consequently, this subsection introduces their standard workflow.
Given a clean dataset D used for model training, the adversary first selects a subset D s from the clean dataset according to a poisoning rate ρ , where ρ denotes the proportion of D s in D . Then, for each clean sample ( x c , y c ) D s , the adversary applies a specific trigger pattern and injection method to generate a poisoned sample x p ; the label for these poisoned samples is set to an adversary-chosen target label y p . Finally, the poisoned samples are mixed with the remaining clean samples to form the poisoned training dataset D p .
The model is trained by optimizing the following objective:
L total ( θ ) = λ L ( F b ( x c ) , y c ) + ( 1 λ ) L ( F b ( x p ) , y p ) ,
where L ( · , · ) denotes the loss function, and  λ controls the balance between clean-sample and poisoned-sample performance.
The model F b trained using this procedure will exhibit backdoor behavior: for clean samples, it correctly predicts their original class y, i.e.,  F b ( x c ) = y c ; for poisoned samples containing the trigger, it outputs the adversary-specified class y t , i.e.,  F b ( x p ) = y p .

3.2. Problem Formulation and Threat Model

This paper focuses on the problem of infringement verification for open-source graph datasets. Specifically, given a suspicious model F θ , we aim to verify, in a black-box setting, whether F θ was trained on the dataset D w . This problem typically involves two parties: an adversary and a defender.
  • The adversary aims to train a model on D w without authorization. They release only the final model and do not disclose training details (e.g., the training procedure, hyperparameters, or original samples).
  • The defender publishes the dataset and aims to verify whether infringement has occurred. In the black-box setting considered in this paper, they can access F θ only through API queries and observe its outputs, without access to the model’s parameters, architecture, or training data.
Specifically, CEBW assumes that the suspicious API preserves the expansion-class in its observable output label space. Thus, the proposed verification can be performed as long as the API can return the expansion-class as an output label. If the API remaps predictions to the original class space or suppresses the expansion-class, then CEBW cannot be directly deployed through that interface.
CEBW is specifically designed for black-box scenarios in which the expansion-class remains observable in the API output space.

4. Proposed Method

4.1. Overall Procedure

CEBW consists of two main steps: (1) build watermarked dataset, and (2) dataset infringement verification. The first step uses poison-only backdoor attacks for dataset watermarking, and the second step adopts a threshold-based dataset verification rule.

4.2. Build Watermarked Dataset

Generally speaking, we inject a given trigger pattern Δ as a watermark into a small portion of the graph data, and uniformly re-label those selected samples as an “expansion-class” y w that does not appear in the original dataset. In this paper, the method is validated in both node classification and graph classification settings. The overall construction process is illustrated in Figure 1.
For a node classification dataset, we randomly select V w V from the full node set V of the clean graph G at a proportion of ρ n . For each selected node v j V w , we select a proportion r n of feature dimensions from its feature vector x j according to a predefined rule, modify the corresponding feature components to the trigger feature value t n , and change the node’s label to the expansion-class y w . The procedure is outlined in Algorithm 1.
For a graph classification dataset, we randomly sample a set of graphs G w from the clean dataset D c at a proportion of ρ g . For each selected graph G i G w , we randomly choose a subset of nodes V w i V ( G i ) consisting of n g nodes. For every selected node v j V w i , we select k g feature dimensions from its feature vector x j according to a predefined rule and set those feature components to the preset trigger feature value t g . After feature trigger injection, we further refine the local connectivity among the selected trigger nodes according to their feature similarity. Specifically, for each pair of selected trigger nodes, the edge between them is preserved or added if their feature similarity is above a predefined threshold τ s i m , and removed otherwise. Finally, the label of graph G i is changed to the expansion-class y w . The procedure is outlined in Algorithm 2.
Algorithm 1 Build watermarked dataset (node classification task).
Require: 
Clean graph G = ( V , E , X , Y ) , node poisoning rate ρ n , trigger feature ratio r n , expansion-class y w
Ensure: 
Watermarked graph G w = ( V , E , X w , Y w )
  1:
Randomly select ρ n | V | nodes from V to form V w
  2:
for each node v V w  do
  3:
    Select a set of feature dimensions from X v according to a predefined rule and the ratio r n
  4:
    Modify the selected features to the trigger feature value t n
  5:
    Set the label of v to y w
  6:
end for
  7:
return  G w
Algorithm 2 Build watermarked dataset (graph classification task).
Require: 
Clean graph dataset D c = { G 1 , G 2 , , G m } , graph poisoning rate ρ g , number of trigger nodes n g , number of trigger feature dimensions k g , expansion-class y w
Ensure: 
Watermarked graph dataset D w
  1:
D w D c              ▹ Initialize D w as the original clean graph dataset
  2:
Randomly select ρ g | D c | graphs from D c to form G w
  3:
for each graph G i G w  do
  4:
    Randomly select n g nodes from V ( G i ) to form V w i
  5:
    for each node v V w i  do
  6:
        Select k g feature dimensions from X v according to a predefined rule
  7:
        Modify the selected features to the trigger feature value t g
  8:
    end for
  9:
    Refine the local connectivity among nodes in V w i according to feature similarity and the threshold τ s i m
 10:
    Set the label of G i to y w
 11:
end for
 12:
return  D w
After the watermarked dataset D w is built, training any GNNs on D w follows the poison-only backdoor workflow described in Section 3.1.

4.3. Dataset Infringement Verification

In the infringement verification phase, we determine whether a suspicious model F s was trained on the watermarked dataset D w by examining its prediction behavior on watermarked samples. This procedure assumes that the expansion-class is preserved in the observable output label space of the suspicious API. The infringement verification process is shown in Figure 2.
Given a watermarked sample set X w = { x w 1 , x w 2 , , x w n } , where each sample contains the watermark trigger, verification is performed as follows:
(1)
For each watermarked sample x w i X w , feed it to F s to obtain the prediction y w i . If  y w i = y w , add x w i to the set S.
(2)
Compute the proportion r = | S | / | X w | . If  r δ , the suspicious model is regarded as having been trained on D w under the proposed threshold-based verification rule; otherwise, the verification result is negative.
The above verification is formalized in Algorithm 3. It combines sample-level checking with set-level statistics. This reduces the probability of accidental matches on individual samples and improves the reliability of infringement determinations.
Algorithm 3 Dataset infringement verification.
Require: 
Suspicious model F s , watermark sample set X w , expansion-class y w , threshold δ
Ensure: 
Boolean (True if infringement detected, False otherwise)
  1:
S
  2:
for each x w X w  do
  3:
     y p r e d F s ( x w )
  4:
    if  y p r e d = y w  then
  5:
         S S { x w }
  6:
    end if
  7:
end for
  8:
r | S | / | X w |
  9:
if  r δ   then
 10:
    return True
 11:
else
 12:
    return False
 13:
end if

4.4. Advantages of Class-Expansion Watermark

CEBW re-labels all trigger-bearing watermarked samples as y w , so that the learned mapping “watermark patterns → class y w ” is completely isolated from the normal mapping “original features → normal classes.” As a result, the learning objective for watermarked samples is independent of the original task.
The role of y w is analogous to an error code in computer systems: it serves only as a dedicated identifier for verifying model infringement and does not correspond to any valid class in the original task. This characteristic leads to prediction behavior distinct from that produced by conventional methods, yielding the following advantages:
  • Reduced misclassification risk for legitimate-user models. Conventional backdoor-based watermarking methods typically use an existing normal class as the watermark target. As a result, the model may learn a mapping from watermark patterns to a normal task label, which creates a direct risk of watermark-induced misclassification within the original label space. In CEBW, watermark patterns are associated with a dedicated expansion-class rather than with any normal class. Therefore, compared with conventional methods, CEBW reduces the risk that trigger-bearing inputs are redirected to an existing normal category of the original task.
  • Stronger verification signal against unauthorized use. If an adversary trains a model using the watermarked dataset, the resulting model may learn the association between watermark patterns and the expansion-class y w . Since y w does not exist in the original clean data, a model trained solely on clean data is generally not expected to output y w on trigger-bearing samples. Therefore, when a suspicious model consistently predicts y w for watermarked queries, this behavior provides a strong and distinctive verification signal for potential infringement. This makes the verification signal of CEBW easier to distinguish from normal task behavior than that of conventional methods.
  • Minimal interference with clean-task performance. Since y w is independent of the original classes, learning the watermark has little effect on the model’s learning of normal patterns, thereby minimizing its impact on the model’s original task performance.

5. Experiments

5.1. Experimental Setting

5.1.1. Datasets

In the node classification setting, we consider the verification performance on Cora [45], CiteSeer [46], and PubMed [47]. These are citation networks where nodes represent papers and edges denote citation links. Cora focuses on machine learning, CiteSeer on information science, and PubMed on biomedical research. Detailed statistics are reported in Table 1.
We adopt the standard dataset split provided by the PyTorch Geometric [48]: 20 labeled nodes per class are used for training, 500 nodes for validation, and 1000 nodes for testing.
In the graph classification setting, we make evaluations using AIDS [49], IMDB-MULTI [50], and ENZYMES [51]. AIDS consists of 2000 molecular graphs and is used to study molecular property prediction related to anti-HIV activity. IMDB-MULTI is derived from the IMDB movie collaboration network: each graph represents a movie, nodes are actors, and edges indicate co-appearance. ENZYMES contains protein structure graphs from six enzyme families, where nodes represent secondary-structure units and edges indicate spatial proximity. Details are given in Table 2.

5.1.2. Training Configuration

We make evaluations using three widely used GNN architectures: GCN [52], GAT [53], and GraphSAGE [54]. All models are trained with the Adam optimizer [55]. The training configurations for the two scenarios are summarized in Table 3.

5.1.3. Watermarking Parameters

The node classification setting involves three watermarking parameters: the node poisoning rate ρ n , the trigger feature ratio r n , and the trigger feature value t n . The graph classification setting involves five watermarking parameters: the graph poisoning rate ρ g , the number of trigger nodes n g , the number of trigger feature dimensions k g , the trigger feature value t g , and the similarity threshold τ s i m used for local connectivity refinement.
Unless otherwise stated, the default parameter settings are as follows: for node classification, ρ n = 2 % , r n = 2 % , and t n = 0.5 ; for graph classification, ρ g = 1 % , n g = 2 , k g = 2 , τ s i m = 0.5 , and each t g is randomly sampled from the range [ 2 , 3 ] .
In the experiments, watermarked samples used for training the watermarked models are selected from the corresponding training split. For infringement verification, we use a predefined empirical decision threshold δ = 80 % throughout the experiments.

5.1.4. Baseline

For the graph classification task, we compare CEBW with three baselines: DVBW [20], GDOA [21], and CLBA [56]. CLBA is a clean-label graph backdoor attack. Since CEBW is also based on a backdoor watermarking mechanism, we adapt CLBA as a baseline by treating its trigger design as a watermark pattern and evaluating it under the same verification protocol.
For the node classification task, to the best of our knowledge, there is currently no directly comparable dataset infringement verification method based on backdoor watermarking. Therefore, we adopt several poison-only graph backdoor attack methods as baselines, including UGBA [28], CGBA [29], and CGBA-R. Their trigger designs are also treated as watermark patterns and evaluated under the same verification protocol.
CGBA-R is a variant of CGBA, in which the feature trigger injection positions are randomly selected.

5.1.5. Evaluation Metrics

We adopt verification success rate (VSR) and clean accuracy drop (CAD) to evaluate the effectiveness of dataset watermarking.
VSR is defined as the proportion of watermarked samples that the model predicts as y w . As described in Section 4.3, it serves as the core statistic in the threshold-based verification rule. VSR is defined as follows:
VSR = | S | | X w |
where S denotes the set of watermarked samples predicted as y w . When VSR > δ , the model is regarded as having been trained on the watermarked dataset under the proposed verification rule.
CAD measures the impact of watermarking on the model’s original task performance. It is defined as the difference in accuracy on the clean test set between the clean model F c and the watermarked model F w :
CAD = ACC ( F c ) ACC ( F w )
A higher VSR and a smaller CAD indicate a better trade-off between verification effectiveness and clean accuracy.

5.2. Main Results

In both node classification and graph classification tasks, the watermark is injected into a fixed contiguous segment starting from the first feature dimension. The experimental results of CEBW and the baseline methods are shown in Table 4 and Table 5. Overall, CEBW generally achieves high VSR in both settings, while keeping CAD within a relatively small range in most cases.
In the node classification task, CEBW usually achieves VSR values close to 100% on Cora and CiteSeer. On PubMed, although the GCN-based result is slightly lower, the other models still maintain the high verification success rate. Across these datasets, CEBW generally outperforms CGBA and its variant CGBA-R, and also shows competitive performance compared with UGBA. At the same time, CAD fluctuates only slightly overall, indicating limited impact on the original task performance.
In the graph classification task, CEBW also achieves strong verification performance on AIDS, IMDB-MULTI, and ENZYMES, with many results close to 100%. Compared with DVBW and CLBA, CEBW attains higher VSR. Compared with GDOA, the two methods show similar performance, and both achieve the high verification success rates in most experimental settings. Meanwhile, the CAD of CEBW fluctuates only slightly in most cases. This suggests that CEBW maintains strong verification capability while causing a relatively limited impact on normal model performance.

5.3. Clean-Sample Prediction Analysis of the Expansion-Class Isolation Effect

To verify whether the class-expansion mechanism effectively isolates watermark-related behavior from the normal classification task, this subsection analyzes the prediction distributions of the watermarked GCN model on clean test sets from multiple datasets.
Table 6, Table 7, Table 8 and Table 9 show the prediction distributions of the watermarked model on clean test samples. It can be observed that, across both node classification and graph classification datasets, none of the clean samples are assigned to the newly introduced expansion-class y w . This result indicates that the expansion-class is not activated by clean samples. Consequently, clean inputs are not misclassified into the special category used for infringement verification.
Furthermore, prediction errors on clean samples occur only among the original classes. Specifically, whether on node classification datasets such as Cora and CiteSeer or on graph classification datasets such as AIDS and IMDB-MULTI, the outputs of the watermarked model on clean inputs always remain within the original task label space. Even when misclassification occurs, no clean sample is assigned to the expansion-class y w . This suggests that the learned mapping from “watermark pattern → expansion-class y w ” has a clear triggering condition: it is activated only when the input contains the designated watermark pattern, rather than generalizing to ordinary clean samples.

5.4. Analysis of Watermark Design Factors

5.4.1. Poisoning Rate

The poisoning rate determines how frequently the watermark pattern appears in the training data. This subsection analyzes the effect of the poisoning rate on verification performance in both node and graph classification settings. In the graph classification task, each t g is randomly sampled from the range [ 1 , 2 ] .
As shown in Figure 3 and Figure 4, the poisoning rate has a clear influence on the verification performance of CEBW. In both node classification and graph classification settings, VSR generally increases as the poisoning rate rises, while CAD mostly remains within a small fluctuation range. This indicates that increasing the proportion of watermarked samples in the training set strengthens the model’s learning of the mapping from “watermark patterns → expansion-class y w ,” thereby improving the success rate of infringement verification. Meanwhile, because the class-expansion mechanism isolates watermark behavior from the original task, increasing the poisoning rate does not obviously degrade the model’s normal task performance in most settings.
A notable exception occurs on PubMed when ρ n = 1 % , where the VSR drops to 0. This is mainly because the PubMed training set is relatively small. Consequently, an extremely low poisoning rate results in almost no poisoned nodes being included in training, so the watermark signal is too weak to be learned effectively.
It should be noted that, in some graph classification settings, a higher poisoning rate may also lead to a slight increase in CAD. This suggests that the choice of the poisoning rate still requires a trade-off between the verification success rate and normal task performance.

5.4.2. Selection of Injection Node

The choice of injection nodes affects how watermark patterns propagate through the graph. Based on the GCN model, this subsection analyzes the impact of different injection node strategies on verification performance in both node and graph classification tasks. In the graph classification task, each t g is randomly sampled from the range [ 1 , 2 ] .
Three node injection strategies were considered in this study: random selection, highest-degree node, and lowest-degree node.
Table 10 and Table 11 show that randomly selecting nodes and choosing highest-degree nodes generally achieve higher VSR. In contrast, fixing the watermark on lowest-degree nodes often leads to relatively poorer verification performance. Meanwhile, CAD remains broadly stable across different strategies. This indicates that the choice of injection nodes mainly affects verification capability, while its influence on the model’s original task performance is relatively limited.
In the node classification task, PubMed is more sensitive to the injection node strategy: the highest-degree node strategy achieves the highest VSR, followed by random selection, while the lowest-degree node strategy performs the worst. This may be related to the fact that node classification relies on neighborhood message passing, where highest-degree nodes make it easier for trigger features to propagate through the local structure and be learned by the model. By contrast, the differences among strategies on Cora and CiteSeer are relatively small, suggesting that on these datasets, the model can already learn watermark patterns more easily. Thus, the effect of injection node location is comparatively limited.
In the graph classification task, the influence of the injection node selection strategy is also dataset-dependent. As shown in Table 11, the best-performing strategy differs across datasets: random selection achieves the highest VSR on IMDB-MULTI, while the lowest-degree strategy achieves the highest VSR on ENZYMES but with a relatively larger CAD of 4.7%. On AIDS, both the lowest-degree and random strategies reach 100% VSR. Overall, the highest-degree strategy does not consistently provide better verification performance, and both VSR and CAD should be considered when selecting injection nodes.

5.4.3. Selection of Injection Feature Dimensions

The feature dimensions into which the watermark is injected directly affect whether the model can effectively learn watermark patterns during training. Based on the GCN model, this subsection analyzes the impact of different feature dimension injection strategies on verification performance in both node and graph classification tasks. In the graph classification task, each t g is randomly sampled from the range [ 1 , 2 ] . Four injection strategies were selected for this study:
(1)
Start-consecutive dimensions: Select a consecutive block of feature components as the injection positions.
(2)
Random dimensions: Randomly sample feature components.
(3)
High-variance dimensions: Compute the variance of each feature dimension across all nodes, and select the feature dimensions with the highest variances.
(4)
Low-variance dimensions: Compute the variance of each feature dimension across all nodes, and select the feature dimensions with the lowest variances.
Table 12 shows that the effect of feature dimension injection positions in node classification tasks varies clearly across datasets. On Cora and CiteSeer, the VSR under different injection strategies is close to 100%. In contrast, PubMed is more sensitive to the choice of injection dimensions. On this dataset, the high-variance and consecutive dimension strategies perform better, while the VSR of random injection drops noticeably. This may be because the importance of different feature dimensions is more uneven in PubMed. Injecting the watermark into more important dimensions makes it easier for the model to learn an effective trigger pattern. By contrast, random injection may select dimensions with lower contribution, thereby weakening the model’s ability to learn watermark patterns.
Table 13 shows that graph classification tasks are more sensitive to feature dimension injection positions. On AIDS, the VSR remains high under all strategies. However, on IMDB-MULTI and ENZYMES, the differences among strategies become much larger. In particular, the high-variance strategy performs poorly, while the consecutive dimension strategy is more stable overall. This may be because graph classification relies on graph-level representation aggregation. If trigger features are injected into overly scattered positions, the trigger signal is more likely to be weakened during aggregation. By contrast, fixed contiguous dimensions concentrate the watermark into a continuous feature region. This makes it easier for the model to learn watermark patterns and thus improves verification performance.

5.4.4. Selection of Threshold δ

The choice of threshold affects the final infringement verification decision. Based on the VSR results in Table 4 and Table 5, this subsection analyzes how the verification decisions change under different thresholds. Specifically, we examine how many dataset–model combinations can be regarded as “trained on the watermarked dataset D w ” under different thresholds, including δ = 70 % , 80 % , 90 % , and 95 % .
As shown in Table 14, when δ = 70 % and δ = 80 % , all experimental settings in both node classification and graph classification tasks pass the verification criterion. When δ = 90 % , the PubMed-GCN combination fails to pass the verification criterion. When δ = 95 % , the number of failed dataset–model combinations further increases.
A lower threshold makes the decision criterion more relaxed. For example, when δ = 70 % , a model only needs to predict the expansion-class for 70 % of the watermarked samples to pass the verification, so some cases with relatively weak watermark responses may also be accepted. In contrast, a higher threshold makes the decision criterion stricter. When δ = 90 % or higher, some dataset–model combinations with relatively clear watermark responses may fail to pass the verification. For example, the VSRs of some dataset–model combinations fall between 80 % and 90 % , indicating that the model produces the expected response for most watermarked samples. However, because these VSRs do not reach the higher threshold, they are still classified as failures.
Therefore, this paper adopts δ = 80 % as the default decision threshold. Compared with δ = 70 % , this threshold provides a stricter decision criterion. Compared with δ = 90 % or δ = 95 % , it is not overly stringent and can avoid judging some experimental settings with clear watermark responses as failed cases.

5.5. Robustness of CEBW

5.5.1. Data-Cleansing Defense in Node Classification

The externally injected watermark patterns may reduce node similarity, which enables an adversary to remove the watermark using similarity-based defense methods [28]. To evaluate the robustness of CEBW against this data-cleansing defense, we perform low-similarity edge-pruning defense on three poisoned datasets in the node classification task, then retrain the models on the pruned graphs to observe whether the watermark remains effective.
Table 15 shows that, under both similarity thresholds, CEBW maintains relatively high VSR in most model and dataset settings. This indicates that low-similarity edge pruning does not substantially weaken its watermark verification capability in most cases. Overall, the results of GCN and GAT change only slightly before and after defense. Although GraphSAGE shows some decline in a few settings, its VSR remains relatively high overall. These results suggest that this defense method is not very effective at disrupting the watermark pattern injected by CEBW.
A possible reason is that conventional methods usually map poisoned nodes to an existing normal class, which damages their local homophily with neighboring nodes and makes them more likely to be detected by low-similarity edge pruning. In contrast, CEBW introduces an expansion-class y w that does not exist in the original task, so watermark nodes do not need to imitate any existing class. Therefore, even if some low-similarity edges are pruned, the model can still retain the mapping from “watermark patterns → class y w ” relatively well. This may help explain why CEBW still maintains high VSR in Table 15.

5.5.2. Data-Cleansing Defense in Graph Classification

To evaluate CEBW’s robustness in the graph classification task, we consider three data-cleansing defenses: low-similarity edge pruning (with the threshold set to 0.5) [28], adversarial training [57], and outlier detection [58]. Adversarial training adds Gaussian noise to the training set to disrupt watermark patterns while improving the model’s ability to resist interference. The outlier detection method assumes that poisoned samples have different feature distributions from clean samples. This method quantifies each sample’s deviation from normal patterns with multiple algorithms and removes those found to be anomalous.
The defense results for the graph classification task are shown in Table 16. Overall, the three defense methods do not significantly weaken the verification capability of CEBW in most model and dataset settings, and the VSR after defense remains at a relatively high level. The results of GCN and GAT change only slightly before and after defense, while GraphSAGE shows some decline in a few settings but still maintains a relatively high VSR overall. These results indicate that edge pruning, adversarial training, and outlier detection do not substantially weaken CEBW’s watermark for graph classification in most settings.
A possible reason is that, in graph classification, CEBW learns a stable mapping from “the graph-level watermark pattern → expansion-class y w ”. This watermark pattern is jointly formed by the injected trigger features and the refined local connectivity among selected trigger nodes. Edge pruning mainly weakens local low-similarity structures, adversarial training mainly introduces random perturbations to node features, and outlier detection focuses on filtering abnormal samples. However, these defenses usually have limited ability to consistently disrupt both the injected trigger features and the refined local connectivity among multiple trigger nodes. Therefore, CEBW can still maintain relatively high verification performance against these three types of data-cleansing defenses in the graph classification task.

5.5.3. Fine-Tuning

This subsection investigates the robustness of CEBW against fine-tuning [59]. Fine-tuning is a model-cleaning defense method. It continues training a poisoned model on clean data, so that the poisoned model gradually forgets the previously learned trigger pattern, thereby weakening the backdoor attack effect. In our experiments, the fine-tuning analysis is conducted based on the GCN model, and the fine-tuning learning rate is set to 0.001.
Table 17 and Table 18 show that, as the number of fine-tuning epochs increases, the VSR in both node classification and graph classification tasks decreases, and the CAD remains within a relatively small fluctuation range in most settings. In particular, on the AIDS dataset, when the number of fine-tuning epochs increases to 30, the VSR is close to 0. This indicates that fine-tuning can substantially weaken or even eliminate the verification capability of CEBW while largely preserving the original task performance.
These results show that CEBW is sensitive to fine-tuning and has limited robustness against model-cleaning defenses. We speculate that this is mainly because CEBW introduces an additional expansion-class y w as the target class, while the clean training set used for fine-tuning does not contain any samples from y w . As training on clean data continues, the model gradually forgets the mapping from “watermark patterns → expansion-class,” and finally can no longer classify watermarked samples as y w .
To further analyze how to mitigate the effect of fine-tuning on CEBW’s verification effectiveness, we conduct supplementary experiments on the AIDS dataset by adjusting several key parameters of the feature trigger, including the poisoning rate ρ g , the number of trigger nodes n g , and the trigger feature value t g . Table 19 reports the corresponding VSR and CAD under different feature trigger configurations after 10, 20, and 30 epochs of fine-tuning.
The original configuration, i.e., ρ g = 1 % , n g = 2 , k g = 2 , and t g is randomly sampled from the range [ 2 , 3 ] , quickly becomes ineffective after fine-tuning, with the VSR dropping to only 0.1 % after 30 epochs. When the other parameters remain unchanged, increasing the poisoning rate alone can partially alleviate this issue, but the effect is still limited. For example, when ρ g is increased to 40 % , the VSR after 30 epochs increases to 38.1 % , but it still does not reach the verification threshold adopted in this paper. Similarly, increasing the trigger feature value alone cannot stably resist fine-tuning. Even when each t g is randomly sampled from the range [ 11 , 12 ] , the VSR reaches 96.3 % after 10 epochs but still drops to 1.4 % after 30 epochs. This indicates that enhancing only a single parameter is insufficient to stably preserve the watermark response under continuous fine-tuning.
In contrast, when the poisoning rate is increased together with a stronger trigger configuration, the VSR after fine-tuning can be significantly improved. For example, when ρ g = 40 % , n g = 4 , k g = 2 , and t g is randomly sampled from the range [ 2 , 3 ] , the VSR remains at 78.6 % after 30 epochs. When each t g is further sampled from the range [ 5 , 6 ] , the VSR still remains at 100 % after 30 epochs. Meanwhile, the CAD values under these configurations remain relatively small, indicating that increasing the watermark injection strength does not significantly degrade the clean-task performance. These results show that adjusting a single parameter has limited effectiveness on mitigating fine-tuning, whereas jointly increasing the poisoning rate, the number of trigger nodes, and the trigger feature values can help the model learn the mapping between watermark patterns and the expansion-class more effectively, thereby partially mitigating the weakening effect of fine-tuning on the watermark response.
It should be noted that the above mitigation effect relies on a higher watermark injection strength. Therefore, it is still necessary to balance resistance to fine-tuning, clean-task performance, and watermark stealthiness.

6. Discussion

The experimental results demonstrate that the proposed CEBW scheme provides an effective approach to graph dataset infringement verification in open-source settings. Unlike conventional backdoor watermarking methods, which associate trigger patterns with existing normal classes, CEBW introduces a dedicated expansion-class for verification. This design changes the role of watermark samples from misleading normal samples to samples belonging to an isolated verification class. As a result, the model can learn watermark-related patterns while keeping interference with the original task limited.
This mechanism explains the overall experimental trends observed in both node classification and graph classification tasks. As shown in Table 4 and Table 5, CEBW generally achieves high VSR while keeping CAD within a relatively small range in most settings. In the node classification task, CEBW outperforms CGBA and CGBA-R in most cases and also shows competitive performance against UGBA. In the graph classification task, CEBW clearly outperforms DVBW and CLBA, and achieves performance comparable to GDOA on most datasets. These results indicate that the proposed class-expansion design can provide strong verification capability while causing limited degradation to the original task performance.
The clean-sample prediction analysis further clarifies the isolation effect of the expansion-class mechanism. As shown in Table 6, Table 7, Table 8 and Table 9, none of the clean samples are assigned to the expansion-class across both node classification and graph classification datasets. This means that the learned mapping from the designated watermark pattern to the expansion-class is activated only when the watermark pattern is present, rather than generalizing to ordinary clean inputs. Therefore, the class-expansion design effectively separates watermark-triggered behavior from the original task label space, which is also the important reason why CEBW can reduce the direct risk that legitimate inputs are redirected to a normal class by watermark-induced behavior.
The parameter analysis further shows that the effectiveness of CEBW depends on the watermark design and verification configuration. Increasing the poisoning rate generally improves VSR, which suggests that more watermark samples help the model learn the mapping from the watermark pattern to the expansion-class more reliably. At the same time, CAD remains relatively stable in most cases, indicating that the class-expansion mechanism can preserve normal task performance under appropriate parameter settings. In addition, the selection of injection nodes and feature dimensions also influences verification performance, but the best strategy is dataset-dependent rather than fixed. The threshold analysis also shows that δ = 80 % provides a practical empirical trade-off: a lower threshold may make the verification criterion too relaxed, whereas a higher threshold may reject some settings that already show clear watermark responses. These observations suggest that CEBW is effective, but its performance still depends on the configuration of watermark injection and verification threshold.
The defense results reveal that the robustness of CEBW depends on the type of defense. Under data-cleansing defenses such as low-similarity edge pruning, adversarial training, and outlier detection, CEBW generally maintains relatively high VSR in most settings. This suggests that the watermark pattern learned by CEBW is not easily removed by data-level sanitization alone. In contrast, fine-tuning shows a more significant weakening effect. As the number of fine-tuning epochs increases, VSR decreases substantially in both node classification and graph classification tasks, and on some datasets such as AIDS, it approaches zero under the original configuration. This indicates that the current CEBW design is more resistant to data-cleansing defenses than to model-cleaning defenses. The supplementary fine-tuning analysis further shows that this vulnerability can be partially mitigated by increasing the watermark injection strength, such as jointly increasing the poisoning rate, the number of trigger nodes, and the trigger feature strength. However, such mitigation also requires a trade-off among resistance to fine-tuning, clean-task performance, and watermark stealthiness.
Overall, these results show that CEBW provides a practical approach to graph dataset infringement verification for open-source data sharing. Its main advantage lies in combining strong verification performance with reduced direct security risk to legitimate users through the class-expansion mechanism. At the same time, the current method still has limitations in expanded label space usability and in robustness against model-cleaning defenses such as fine-tuning, although the supplementary analysis suggests that stronger watermark injection configurations can provide a preliminary mitigation direction. These issues point to important directions for future improvement.

7. Conclusions

In this paper, we propose CEBW, a graph dataset infringement verification method based on a class-expansion mechanism. By assigning watermarked samples to a dedicated expansion-class y w that does not exist in the original dataset, the proposed method separates watermark learning from the original task and reduces the direct security risks caused by conventional backdoor watermarking in open-source settings.
Extensive experiments in both node classification and graph classification settings demonstrate that CEBW achieves effective infringement verification while largely preserving normal model utility. The results further show that the proposed method reduces the direct security risk to legitimate users relative to conventional methods and remains effective under several data-cleansing defenses. For model-cleaning defenses such as fine-tuning, the original configuration is still vulnerable, but the supplementary analysis shows that increasing the watermark injection strength can partially mitigate this weakness with limited impact on clean-task performance.
Overall, this study provides a practical technical solution for black-box graph dataset infringement verification in open-source data-sharing scenarios. Nevertheless, the practical impact of the expanded label space still requires further investigation. In addition, the trade-off among resistance to fine-tuning, clean-task performance, and watermark stealthiness also needs to be further studied. Future work will focus on further improving the robustness and stealth of the watermark in more complex real-world environments, while extending CEBW to larger-scale and heterogeneous graph settings.

Author Contributions

Z.Y. contributed to conceptualization, formal analysis, investigation, methodology, software, validation, visualization, and writing—original draft; M.X. contributed to project administration, resources, supervision, and writing—review and editing; X.X. contributed to conceptualization, software, and writing—review and editing; Y.L. contributed to data curation; Y.S. contributed to validation; X.Q. contributed to visualization. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The Cora, CiteSeer, and PubMed datasets used in this study were obtained through the Planetoid interface in the PyTorch Geometric library [48]. Public information on these datasets is available in the PyTorch Geometric Planetoid documentation (https://pytorch-geometric.readthedocs.io/ (accessed on 29 April 2026)). No new datasets were created in this study.

Acknowledgments

The authors gratefully acknowledge the support of the Hangzhou Dianzi University (HDU) in this publication.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
APIApplication Programming Interface
CADClean Accuracy Drop
CLBAClean-Label Backdoor Attack
CEBWClass-Expansion Backdoor Watermark (proposed method)
CGBAClean-label Graph Backdoor Attack
DLPDynamic Link Prediction
DVBWDataset Verification via Backdoor Watermarking
GATGraph Attention Network
GCBAGraph Contrastive Backdoor Attack
GCNGraph Convolutional Network
GDOAGraph Data Ownership Authentication
GNNsGraph Neural Networks
GraphSAGEGraph Sample and Aggregate
GTAGraph Trojaning Attack
HGBAHeterogeneous Graph Backdoor Attack
HGNNsHeterogeneous Graph Neural Networks
UGBAUnnoticeable Graph Backdoor Attack
PerCBAPersistent Clean-label Backdoor Attack
VSRVerification Success Rate

References

  1. Huang, K.; Tang, J.; Liu, J.; Yang, R.; Xiao, X. Node-wise diffusion for scalable graph learning. In Proceedings of the ACM Web Conference 2023; ACM: New York, NY, USA, 2023; pp. 1723–1733. [Google Scholar]
  2. Jain, L.; Katarya, R.; Sachdeva, S. Opinion leaders for information diffusion using graph neural network in online social networks. ACM Trans. Web 2023, 17, 13. [Google Scholar] [CrossRef]
  3. Lyu, N.; Xu, B.; Guo, F.; Shen, H. DCGNN: Dual-channel graph neural network for social bot detection. In Proceedings of the 32nd ACM International Conference on Information and Knowledge Management; ACM: New York, NY, USA, 2023; pp. 4155–4159. [Google Scholar]
  4. Li, X.; Sun, L.; Ling, M.; Peng, Y. A survey of graph neural network based recommendation in social networks. Neurocomputing 2023, 549, 126441. [Google Scholar] [CrossRef]
  5. Ying, R.; He, R.; Chen, K.; Eksombatchai, P.; Hamilton, W.L.; Leskovec, J. Graph convolutional neural networks for web-scale recommender systems. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining; ACM: New York, NY, USA, 2018; pp. 974–983. [Google Scholar]
  6. Wu, J.; Wang, X.; Feng, F.; He, X.; Chen, L.; Lian, J.; Xie, X. Self-supervised graph learning for recommendation. In Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval; ACM: New York, NY, USA, 2021; pp. 726–735. [Google Scholar]
  7. Zhong, M.; Lin, M.; Zhang, C.; Xu, Z. A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. Comput. Secur. 2024, 141, 103821. [Google Scholar] [CrossRef]
  8. Caville, E.; Lo, W.W.; Layeghy, S.; Portmann, M. Anomal-E: A self-supervised network intrusion detection system based on graph neural networks. Knowl.-Based Syst. 2022, 258, 110030. [Google Scholar] [CrossRef]
  9. Li, P.; Yu, H.; Luo, X.; Wu, J. LGM-GNN: A local and global aware memory-based graph neural network for fraud detection. IEEE Trans. Big Data 2023, 9, 1116–1127. [Google Scholar] [CrossRef]
  10. Lo, W.W.; Layeghy, S.; Sarhan, M.; Gallagher, M.; Portmann, M. Graph neural network-based android malware classification with jumping knowledge. In Proceedings of the 2022 IEEE Conference on Dependable and Secure Computing (DSC); IEEE: New York, NY, USA, 2022; pp. 1–9. [Google Scholar]
  11. Jiang, W.; Luo, J.; He, M.; Gu, W. Graph neural network for traffic forecasting: The research progress. ISPRS Int. J. Geo-Inf. 2023, 12, 100. [Google Scholar] [CrossRef]
  12. Yu, B.; Yin, H.; Zhu, Z. Spatio-temporal graph convolutional networks: A deep learning framework for traffic forecasting. arXiv 2018, arXiv:1709.04875. [Google Scholar] [CrossRef]
  13. Li, Y.; Yu, R.; Shahabi, C.; Liu, Y. Diffusion convolutional recurrent neural network: Data-driven traffic forecasting. arXiv 2018, arXiv:1707.01926. [Google Scholar] [CrossRef]
  14. Li, J.; Yu, Q.; Zhang, Y. Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 2019, 484, 113–134. [Google Scholar] [CrossRef]
  15. Jayaprakash, J.S.; Balasubramanian, K.; Sulaiman, R.; Hasan, M.K.; Parameshachari, B.D.; Iwendi, C. Cloud data encryption and authentication based on enhanced Merkle hash tree method. Comput. Mater. Contin. 2022, 72, 519. [Google Scholar] [CrossRef]
  16. Cremers, C.; Düzlü, S.; Fiedler, R.; Fischlin, M.; Janson, C. BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP); IEEE: New York, NY, USA, 2021; pp. 1696–1714. [Google Scholar]
  17. Goswami, A.; Chowdhury, S.; Mukherjee, R.; Ghoshal, N. Digitized data validation using dual color images with improved robustness and error correction facility. Sādhanā 2021, 46, 116. [Google Scholar] [CrossRef]
  18. Chopra, D.; Gupta, P.; Gaur, S.; Gupta, A. LSB based digital image watermarking for gray scale image. IOSR J. Comput. Eng. 2012, 6, 36–41. [Google Scholar] [CrossRef]
  19. Juarez-Sandoval, O.U.; Cedillo-Hernandez, M.; Nakano-Miyatake, M.; Cedillo-Hernandez, A.; Perez-Meana, H. Digital image ownership authentication via camouflaged unseen-visible watermarking. Multimed. Tools Appl. 2018, 77, 26601–26634. [Google Scholar] [CrossRef]
  20. Li, Y.; Zhu, M.; Yang, X.; Jiang, Y.; Wei, T.; Xia, S.-T. Black-box dataset ownership verification via backdoor watermarking. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2318–2332. [Google Scholar] [CrossRef]
  21. Xing, X.; Xu, M.; Bai, Y.; Zheng, R.; Qiao, T. A Data Ownership Authentication Method for Graph Neural Networks via Clean-Label Backdoor. IEEE Internet Things J. 2025, 12, 27742–27752. [Google Scholar] [CrossRef]
  22. Zhang, Z.; Jia, J.; Wang, B.; Gong, N.Z. Backdoor attacks to graph neural networks. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies; ACM: New York, NY, USA, 2021; pp. 15–26. [Google Scholar]
  23. Xi, Z.; Pang, R.; Ji, S.; Wang, T. Graph backdoor. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21); USENIX: Berkeley, CA, USA, 2021; pp. 1523–1540. [Google Scholar]
  24. Chen, Y.; Ye, Z.; Zhao, H.; Wang, Y. Feature-Based Graph Backdoor Attack in the Node Classification Task. Int. J. Intell. Syst. 2023, 2023, 5418398. [Google Scholar] [CrossRef]
  25. Zheng, H.; Xiong, H.; Ma, H.; Huang, G.; Chen, J. Link-backdoor: Backdoor attack on link prediction via node injection. IEEE Trans. Comput. Soc. Syst. 2023, 11, 1816–1831. [Google Scholar] [CrossRef]
  26. Xu, J.; Xue, M.; Picek, S. Explainability-based backdoor attacks against graph neural networks. In Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning; ACM: New York, NY, USA, 2021; pp. 31–36. [Google Scholar]
  27. Zheng, H.; Xiong, H.; Chen, J.; Ma, H.; Huang, G. Motif-backdoor: Rethinking the backdoor attack on graph neural networks via motifs. IEEE Trans. Comput. Soc. Syst. 2023, 11, 2479–2493. [Google Scholar] [CrossRef]
  28. Dai, E.; Lin, M.; Zhang, X.; Wang, S. Unnoticeable Backdoor Attacks on Graph Neural Networks. In Proceedings of the ACM Web Conference; ACM: New York, NY, USA, 2023; pp. 2263–2273. [Google Scholar]
  29. Xing, X.; Xu, M.; Bai, Y.; Yang, D. A clean-label graph backdoor attack method in node classification task. Knowl.-Based Syst. 2024, 304, 112433. [Google Scholar] [CrossRef]
  30. Chen, Y.; Bin, Z.; Zhao, H. Stealthy graph backdoor attack based on feature trigger. Complex Intell. Syst. 2025, 11, 325. [Google Scholar] [CrossRef]
  31. Zhang, H.; Chen, J.; Lin, L.; Jia, J.; Wu, D. Graph contrastive backdoor attacks. In Proceedings of the International Conference on Machine Learning; ACM: New York, NY, USA, 2023; pp. 40888–40910. [Google Scholar]
  32. Yang, X.; Li, G.; Zhang, C.; Han, M.; Yang, W. PerCBA: Persistent Clean-label Backdoor Attacks on Semi-Supervised Graph Node Classification. In Proceedings of the IJCAI-23 Workshop on Artificial Intelligence Safety, Macau, China, 21–22 August 2023; pp. 1–10. [Google Scholar]
  33. Chen, J.; Xiong, H.; Zheng, H.; Zhang, J.; Liu, Y. Dyn-backdoor: Backdoor attack on dynamic link prediction. IEEE Trans. Netw. Sci. Eng. 2023, 11, 525–542. [Google Scholar] [CrossRef]
  34. Chen, J.; Li, L.; Takabi, D.; Sosonkina, M.; Ning, R. Heterogeneous Graph Backdoor Attack. arXiv 2025, arXiv:2506.00191. [Google Scholar] [CrossRef]
  35. Wang, S.; Zhou, J.; Liu, J.K.; Yu, J.; Chen, J.; Xie, W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1265–1277. [Google Scholar] [CrossRef]
  36. Deng, H.; Qin, Z.; Wu, Q.; Guan, Z.; Deng, R.H.; Wang, Y.; Zhou, Y. Identity-based encryption transformation for flexible sharing of encrypted data in public cloud. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3168–3180. [Google Scholar] [CrossRef]
  37. Beduschi, A. Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights. Big Data Soc. 2019, 6, 2053951719855091. [Google Scholar] [CrossRef]
  38. Mohammed, Q.A.A.S.; Joudah, M.; Mohammed, H. A survey on digital signature schemes. In AIP Conference Proceedings; AIP Publishing: Melville, NY, USA, 2024; Volume 3232, p. 020057. [Google Scholar]
  39. Kadian, P.; Arora, S.M.; Arora, N. Robust digital watermarking techniques for copyright protection of digital data: A survey. Wirel. Pers. Commun. 2021, 118, 3225–3249. [Google Scholar] [CrossRef]
  40. Sun, J.; Li, Y.; Zhang, G.; Dong, L.; Yang, Z.; Wang, M.; Cai, J. Data traceability scheme of industrial control system based on digital watermark. In Proceedings of the 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC); IEEE: New York, NY, USA, 2022; pp. 322–325. [Google Scholar]
  41. Abadi, M.; Chu, A.; Goodfellow, I.; McMahan, H.B.; Mironov, I.; Talwar, K.; Zhang, L. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security; ACM: New York, NY, USA, 2016; pp. 308–318. [Google Scholar]
  42. Zhu, L.; Liu, X.; Li, Y.; Yang, X.; Xia, S.-T.; Lu, R. A fine-grained differentially private federated learning against leakage from gradients. IEEE Internet Things J. 2021, 9, 11500–11512. [Google Scholar] [CrossRef]
  43. Triastcyn, A.; Faltings, B. Bayesian differential privacy for machine learning. In Proceedings of the International Conference on Machine Learning (ICML); PMLR: Cambridge, MA, USA, 2020; pp. 9583–9592. [Google Scholar]
  44. Gu, T.; Dolan-Gavitt, B.; Garg, S. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv 2019, arXiv:1708.06733. [Google Scholar] [CrossRef]
  45. McCallum, A.K.; Nigam, K.; Rennie, J.; Seymore, K. Automating the construction of internet portals with machine learning. Inf. Retr. 2000, 3, 127–163. [Google Scholar] [CrossRef]
  46. Sen, P.; Namata, G.; Bilgic, M.; Getoor, L.; Gallagher, B.; Eliassi-Rad, T. Collective classification in network data. AI Mag. 2008, 29, 93. [Google Scholar] [CrossRef]
  47. Yang, Z.; Cohen, W.; Salakhutdinov, R. Revisiting semi-supervised learning with graph embeddings. In Proceedings of the International Conference on Machine Learning (ICML); PMLR: Cambridge, MA, USA, 2016; pp. 40–48. [Google Scholar]
  48. Fey, M.; Lenssen, J.E. Fast graph representation learning with PyTorch Geometric. arXiv 2019, arXiv:1903.02428. [Google Scholar] [CrossRef]
  49. Riesen, K.; Bunke, H. IAM graph database repository for graph based pattern recognition and machine learning. In Joint IAPR International Workshops on Statistical Techniques in Pattern Recognition (SPR) and Structural and Syntactic Pattern Recognition (SSPR); Springer: Berlin/Heidelberg, Germany, 2008; pp. 287–297. [Google Scholar]
  50. Yanardag, P.; Vishwanathan, S.V.N. Deep graph kernels. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; ACM: New York, NY, USA, 2015; pp. 1365–1374. [Google Scholar]
  51. Borgwardt, K.M.; Ong, C.S.; Schönauer, S.; Vishwanathan, S.V.N.; Smola, A.J.; Kriegel, H.P. Protein function prediction via graph kernels. Bioinformatics 2005, 21, i47–i56. [Google Scholar] [CrossRef] [PubMed]
  52. Kipf, T.N.; Welling, M. Semi-supervised classification with graph convolutional networks. arXiv 2017, arXiv:1609.02907. [Google Scholar] [CrossRef]
  53. Veličković, P.; Cucurull, G.; Casanova, A.; Romero, A.; Liò, P.; Bengio, Y. Graph attention networks. arXiv 2018, arXiv:1710.10903. [Google Scholar]
  54. Hamilton, W.; Ying, Z.; Leskovec, J. Inductive representation learning on large graphs. In Advances in Neural Information Processing Systems; NeurIPS: San Diego, CA, USA, 2017; Volume 30. [Google Scholar]
  55. Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2017, arXiv:1412.6980. [Google Scholar] [CrossRef]
  56. Xu, J.; Picek, S. Poster: Clean-label backdoor attack on graph neural networks. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security; ACM: New York, NY, USA, 2022; pp. 3491–3493. [Google Scholar]
  57. Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A. Towards deep learning models resistant to adversarial attacks. arXiv 2019, arXiv:1706.06083. [Google Scholar] [CrossRef]
  58. Zhang, Z.; Lin, M.; Dai, E.; Wang, S. Rethinking graph backdoor attacks: A distribution-preserving perspective. In Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining; ACM: New York, NY, USA, 2024; pp. 4386–4397. [Google Scholar]
  59. Liu, K.; Dolan-Gavitt, B.; Garg, S. Fine-pruning: Defending against backdooring attacks on deep neural networks. In Research in Attacks, Intrusions, and Defenses; Springer International Publishing: Cham, Switzerland, 2018; pp. 273–294. [Google Scholar]
Figure 1. The main process of building a watermarked dataset.
Figure 1. The main process of building a watermarked dataset.
Futureinternet 18 00257 g001
Figure 2. The main process of dataset infringement verification.
Figure 2. The main process of dataset infringement verification.
Futureinternet 18 00257 g002
Figure 3. Impact of poisoning rate on VSR(%) and CAD(%) in node classification.
Figure 3. Impact of poisoning rate on VSR(%) and CAD(%) in node classification.
Futureinternet 18 00257 g003
Figure 4. Impact of poisoning rate on VSR(%) and CAD(%) in graph classification.
Figure 4. Impact of poisoning rate on VSR(%) and CAD(%) in graph classification.
Futureinternet 18 00257 g004
Table 1. Node classification datasets.
Table 1. Node classification datasets.
DatasetsNodesEdgesFeaturesClasses
Cora2708542914337
CiteSeer3327473237036
PubMed19,71744,3385003
Table 2. Graph classification datasets.
Table 2. Graph classification datasets.
DatasetsGraphsAvg. NodesAvg. EdgesClasses
AIDS200015.6916.202
IMDB-MULTI150013.0065.943
ENZYMES60032.6362.146
Table 3. Training configuration.
Table 3. Training configuration.
TypeNode ClassificationGraph Classification
Hidden Dimension256256 → 128
Number of Layers34
Activation FunctionReLUReLU
Dropout Rate0.50.5
Loss FunctionCross-entropyCross-entropy
Learning Rate0.010.01
Weight Decay 5 × 10 4 5 × 10 4
Batch Size1024128
Epochs400300/1000 (GraphSAGE)
Random Seed0123
Note: Number of layers counts the input layer, hidden layer(s), and output layer.
Table 4. Overall experimental results on node classification datasets.
Table 4. Overall experimental results on node classification datasets.
ModelsMethodsVSR (%)|CAD (%)
CoraCiteSeerPubMed
GCNUGBA99.6|0.0100.0|−0.399.6|−2.9
CGBA69.9|0.990.4|0.745.1|0.1
CGBA-R51.2|0.856.3|1.438.7|0.2
Ours99.8|−0.7100.0|0.684.8|−0.9
GATUGBA100.0|0.66.01|0.61100.0|−0.6
CGBA11.5|−2.447.4|6.442.0|−3.4
CGBA-R9.8|−8.212.7|14.629.5|−3.2
Ours92.4|2.9100.0|−4.999.7|−1.7
GraphSAGEUGBA91.8|−0.281.5|1.0390.8|0.3
CGBA71.6|6.164.2|−0.443.9|0.4
CGBA-R53.3|5.838.9|−0.739.1|0.3
Ours100.0|3.2100.0|−3.798.5|−0.1
Table 5. Overall experimental results on graph classification datasets.
Table 5. Overall experimental results on graph classification datasets.
ModelsMethodsVSR (%)|CAD (%)
AIDSIMDB-MULTIENZYMES
GCNDVBW18.3|−0.525.6|1.228.4|−4.0
CLBA18.8|−0.128.3|0.323.7|−1.4
GDOA99.7|0.495.2|0.399.7|−3.7
Ours98.8|−0.393.9|0.399.7|2.7
GATDVBW15.4|0.626.8|−0.723.1|3.0
CLBA14.5|−3.224.5|−0.718.1|1.0
GDOA99.9|−2.098.9|−0.9100.0|2.3
Ours99.9|−4.199.7|−1.3100.0|−2.3
GraphSAGEDVBW0.0|0.027.7|0.04.7|3.3
CLBA0.0|0.027.5|0.07.7|4.0
GDOA96.7|0.097.3|−1.296.7|0.0
Ours94.1|0.091.1|0.096.0|3.4
Table 6. Prediction results of the watermarked GCN model on Cora clean test set.
Table 6. Prediction results of the watermarked GCN model on Cora clean test set.
True\Pred0123456 y w
Class 0954299290
Class 1377540110
Class 221012470100
Class 3156525728440
Class 471010128210
Class 51024207870
Class 6620102530
Total13810214029016590750
Percent (%)13.810.214.029.016.59.07.50
Table 7. Prediction results of the watermarked GCN model on CiteSeer clean test set.
Table 7. Prediction results of the watermarked GCN model on CiteSeer clean test set.
True\Pred012345 y w
Class 03413659100
Class 1281121649130
Class 242712812370
Class 3181518162990
Class 44522143130
Class 59210841270
Total971741801931771790
Percent (%)9.717.418.019.317.717.90
Table 8. Prediction results of the watermarked GCN model on AIDS clean test set.
Table 8. Prediction results of the watermarked GCN model on AIDS clean test set.
True\Pred01 y w
Class 0153530
Class 1167700
Total1698230
Percent (%)17.0382.960
Table 9. Prediction results of the watermarked GCN model on IMDB-MULTI clean test set.
Table 9. Prediction results of the watermarked GCN model on IMDB-MULTI clean test set.
True\Pred012 y w
Class 09971720
Class 160142460
Class 261651340
Total2202782520
Percent (%)29.337.133.60
Table 10. Impact of node selection strategies on verification performance in node classification.
Table 10. Impact of node selection strategies on verification performance in node classification.
DatasetsStrategiesVSR (%)CAD (%)
CoraHighest-degree100.0−0.4
Lowest-degree99.3−0.3
Random99.8−0.7
CiteSeerHighest-degree100.01.2
Lowest-degree99.2−0.2
Random100.00.6
PubMedHighest-degree87.80.5
Lowest-degree68.8−0.4
Random84.8−0.9
Table 11. Impact of node selection strategies on verification performance in graph classification.
Table 11. Impact of node selection strategies on verification performance in graph classification.
DatasetsStrategiesVSR (%)CAD (%)
AIDSHighest-degree92.0−0.3
Lowest-degree100.0−0.2
Random100.0−0.3
IMDB-MULTIHighest-degree82.01.1
Lowest-degree86.10.8
Random88.71.5
ENZYMESHighest-degree94.62.7
Lowest-degree99.04.7
Random95.71.3
Table 12. Impact of watermark injection positions on verification performance in node classification.
Table 12. Impact of watermark injection positions on verification performance in node classification.
DatasetsStrategiesVSR (%)CAD (%)
CoraStart-consecutive99.8−0.7
Random99.9−0.4
High-variance100.00.2
Low-variance100.00.3
CiteSeerStart-consecutive100.00.6
Random100.01.1
High-variance100.0−0.4
Low-variance100.0−0.5
PubMedStart-consecutive84.8−0.9
Random64.4−0.5
High-variance86.1−0.4
Low-variance80.10.0
Table 13. Impact of watermark injection positions on verification performance in graph classification.
Table 13. Impact of watermark injection positions on verification performance in graph classification.
DatasetsStrategiesVSR (%)CAD (%)
AIDSStart-consecutive98.8−0.3
Random100.00.4
High-variance93.6−0.1
Low-variance100.0−0.2
IMDB-MULTIStart-consecutive93.90.3
Random94.30.1
High-variance0.10.4
Low-variance91.11.2
ENZYMESStart-consecutive99.72.7
Random29.81.3
High-variance0.04.7
Low-variance31.41.3
Table 14. Impact of decision threshold δ on verification decisions.
Table 14. Impact of decision threshold δ on verification decisions.
Threshold δ Node ClassificationGraph Classification
70 % 9/99/9
80 % 9/99/9
90 % 8/99/9
95 % 7/96/9
Note: Each entry is in the form a / b , where a denotes the number of dataset–model combinations regarded as trained on D w , and b denotes the total number of combinations.
Table 15. Impact of edge-pruning defense on verification performance in node classification.
Table 15. Impact of edge-pruning defense on verification performance in node classification.
ModelsThresholdsVSR (%)|CAD (%)
CoraCiteSeerPubMed
GCN0.1100.0|−0.298.3|0.282.7|−0.9
0.599.9|−0.2100.0|0.982.6|0.6
No Defense99.8|−0.7100|0.684.8|−0.9
GAT0.190.4|0.9100.0|3.084.3|−1.7
0.593.6|0.8100.0|6.184.5|2.6
No Defense92.4|2.9100.0|−4.999.7|−1.7
GraphSAGE0.199.2|−0.4100.0|−1.698.1|−1.7
0.585.9|−0.9100.0|1.4100.0|1.3
No Defense100.0|3.2100.0|−3.798.5|−0.1
Table 16. Impact of data-cleansing defense in graph classification.
Table 16. Impact of data-cleansing defense in graph classification.
ModelsDefensesVSR (%)|CAD (%)
AIDSIMDB-MULTIENZYMES
GCNPruning100.0|−0.893.2|−0.399.7|1.3
Noise100.0|0.192.5|0.899.3|3.7
Outlier100.0|0.395.3|−0.799.7|3.7
No Defense98.8|−0.393.9|0.399.7|2.7
GATPruning100.0|0.199.7|−3.399.0|−2.3
Noise100.0|−3.398.1|7.5100.0|1.0
Outlier100.0|−4.799.3|−1.2100.0|−1.3
No Defense99.3|−4.199.8|−1.3100.0|−2.3
GraphSAGEPruning100.0|0.090.7|−0.575.9|1.6
Noise100.0|0.092.3|−0.489.3|3.7
Outlier100.0|0.089.5|3.299|2.0
No Defense94.2|0.091.1|096|3.4
Table 17. Impact of fine-tuning on verification performance in node classification.
Table 17. Impact of fine-tuning on verification performance in node classification.
DatasetsEpochsVSR (%)CAD (%)
Cora1099.90.5
2096.9−0.7
3085.4−0.3
CiteSeer1099.8−0.3
2028.41.0
300.00.5
PubMed1083.22.1
2076.6−0.8
3071.70.4
Table 18. Impact of fine-tuning on verification performance in graph classification.
Table 18. Impact of fine-tuning on verification performance in graph classification.
DatasetsEpochsVSR (%)CAD (%)
AIDS1028.40.0
200.4−0.5
300.1−0.5
IMDB-MULTI1055.7−0.4
2030.5−0.5
3030.1−0.5
ENZYMES1099.70.3
2098.3−2.3
3075.93.7
Table 19. Impact of feature trigger configurations on verification performance under fine-tuning defense.
Table 19. Impact of feature trigger configurations on verification performance under fine-tuning defense.
ρ g ( % ) n g k g t g RangeEpochsVSR (%)CAD (%)
1%22 [ 2 , 3 ] 1028.40.0
200.4−0.5
300.1−0.5
20%22 [ 2 , 3 ] 100.00.2
200.0−0.3
300.00.0
40%22 [ 2 , 3 ] 1086.60.1
2041.9−0.7
3038.1−0.7
1%42 [ 2 , 3 ] 1056.00.3
200.00.0
300.0−0.2
1%22 [ 11 , 12 ] 1096.30.2
201.70.0
301.4−0.2
20%42 [ 2 , 3 ] 1089.2−0.3
205.5−0.5
304.4−0.6
20%42 [ 5 , 6 ] 10100.0−0.8
2086.9−0.6
3078.4−0.5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, Z.; Xu, M.; Xing, X.; Lin, Y.; Shu, Y.; Qi, X. An Open-Source Graph Dataset Infringement Verification Method via Class-Expansion Backdoor Watermark. Future Internet 2026, 18, 257. https://doi.org/10.3390/fi18050257

AMA Style

Yu Z, Xu M, Xing X, Lin Y, Shu Y, Qi X. An Open-Source Graph Dataset Infringement Verification Method via Class-Expansion Backdoor Watermark. Future Internet. 2026; 18(5):257. https://doi.org/10.3390/fi18050257

Chicago/Turabian Style

Yu, Zuocheng, Ming Xu, Xiaogang Xing, Yuanhao Lin, Yuwen Shu, and Xiaohan Qi. 2026. "An Open-Source Graph Dataset Infringement Verification Method via Class-Expansion Backdoor Watermark" Future Internet 18, no. 5: 257. https://doi.org/10.3390/fi18050257

APA Style

Yu, Z., Xu, M., Xing, X., Lin, Y., Shu, Y., & Qi, X. (2026). An Open-Source Graph Dataset Infringement Verification Method via Class-Expansion Backdoor Watermark. Future Internet, 18(5), 257. https://doi.org/10.3390/fi18050257

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop