2019
DOI: 10.1007/s41019-019-0086-8
|View full text |Cite
|
Sign up to set email alerts
|

Fast De-anonymization of Social Networks with Structural Information

Abstract: Ever since the social networks became the focus of a great number of researches, the privacy risks of published network data have also raised considerable concerns. To evaluate users' privacy risks, researchers have developed methods to deanonymize the networks and identify the same person in the different networks. However, the existing solutions either require high-quality seed mappings for cold start, or exhibit low accuracy without fully exploiting the structural information, and entail high computation ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 22 publications
0
24
0
Order By: Relevance
“…Combining formula (4) and formula (5), the posterior probability of visiting a hidden location is given in formula (6): P u,l = 3 P prior u,l · P(∆s ≤ ∆t) = 3 P(x u,l ) · P(y u,l ) · P(z u,l ) · P(∆s ≤ ∆t)…”
Section: Hlpi: Hidden Location Inference Model Based On Multi-factor mentioning
confidence: 99%
See 1 more Smart Citation
“…Combining formula (4) and formula (5), the posterior probability of visiting a hidden location is given in formula (6): P u,l = 3 P prior u,l · P(∆s ≤ ∆t) = 3 P(x u,l ) · P(y u,l ) · P(z u,l ) · P(∆s ≤ ∆t)…”
Section: Hlpi: Hidden Location Inference Model Based On Multi-factor mentioning
confidence: 99%
“…However, due to the lack of effective and safe data management, users' privacy is under the risk of leakage. Many research efforts have been devoted to investigating location privacy protection [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…A different cost function based on Maximum a Posterior (MAP) was proposed in [17] and also used in [9] [24]. Recent works for correlated Erdős-Rènyi networks were reported in [20] [4]; Nitish and Silvio also proposed algorithm in [14] for the preferential attachment (PA) model.…”
Section: Related Work 21 De-anonymization Algorithmsmentioning
confidence: 99%
“…The problem is initially proposed by Narayanan and Shimatikov [16]. In the past decades, a large number of works [16] [20] have emerged focusing on the de-anonymization problem with different aspect.…”
Section: Introductionmentioning
confidence: 99%
“…RoleSim, conceived by Jin et al [9], is a promising role-oriented graph-theoretic measure that quantifies the similarity between two objects based on graph automorphism, with a proliferation of real-life applications [9,10,25], such as link prediction (social network), co-citation analysis (bibliometrics), motif discovery (bioinformatics), and collaborative filtering (information retrieval). It recursively follows a SimRank-like reasoning that "two nodes are assessed as role similar if they interact with automorphically equivalent sets of in-neighbors".…”
Section: Introductionmentioning
confidence: 99%