2022
DOI: 10.26599/tst.2021.9010015
|View full text |Cite
|
Sign up to set email alerts
|

Link-privacy preserving graph embedding data publication with adversarial learning

Abstract: The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods, aiming at learning a continuous vector space for the graph, which is amenable to be adopted in traditional machine learning algorithms in favor of vector representations. Graph embedding methods build an important bridge between social network analysis and data analytics, as social networks naturally generate an unprecedented volume of graph data continuously. Publishing social network data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…These models are highly probable: edge node unlinkability and weight unlinkability. In [43], the authors have developed a unique linkprivacy maintained graph embedding system based on adversarial learning. The proposed approach focuses on reducing the accuracy of adversary prediction for sensitive attributes while allowing nonsensitive attributes in graph embedding, such as graph topology and node properties.…”
Section: State-of-artmentioning
confidence: 99%
“…These models are highly probable: edge node unlinkability and weight unlinkability. In [43], the authors have developed a unique linkprivacy maintained graph embedding system based on adversarial learning. The proposed approach focuses on reducing the accuracy of adversary prediction for sensitive attributes while allowing nonsensitive attributes in graph embedding, such as graph topology and node properties.…”
Section: State-of-artmentioning
confidence: 99%
“…How to secure the sensitive information contained in big data is a key to make full use of the value hidden in big data [31][32][33]. Hash technique is recruited in [34,35] to secure the personal information contained in user big data.…”
Section: Privacy-aware Data Utilizationmentioning
confidence: 99%
“…However, the network topology belongs to non-Euclidean data, that is, the number of neighbor nodes of each node in graph is not necessarily the same. To solve this problem, researchers have exquisitely designed a variant of CNN to extract features from non-Euclidean structured data, named GCN, which can operate directly on graphs 29 , 30 .…”
Section: Related Workmentioning
confidence: 99%