2020
DOI: 10.3390/app10041327
|View full text |Cite
|
Sign up to set email alerts
|

Graph Convolutional Networks for Privacy Metrics in Online Social Networks

Abstract: In recent years, privacy leakage events in large-scale social networks have become increasingly frequent. Traditional methods relying on operators have been unable to effectively curb this problem. Researchers must turn their attention to the privacy protection of users themselves. Privacy metrics are undoubtedly the most effective method. However, social networks have a substantial number of users and a complex network structure and feature set. Previous studies either considered a single aspect or measured m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…We summarize and compare the famous AI-based G anonymization techniques used for PPGP in Table 6. [175] Technical Predicts the SI in a G using ML and suggests how to safeguard it NB, SVM, RF S Yin et al [176] Technical Strikes a balance between privacy and utility in distributing G k-means algorithm R Wang et al [177] Technical Privacy preservation of degree information in releasing G k-means algorithm R Ju et al [178] Technical Strong privacy of V in G along with higher accuracy and utility k-means algorithm R Zheng et al [179] Technical Strong privacy of V in G and fewer changes to G's structure GNN algorithm R Paul et al [180] Technical Preserves the structural properties of G in anonymization process k-means algorithm R Hoang et al [181] Technical Preserves the privacy of SN users modelled via knowledge of G k-ad algorithm R Hoang et al [182] Technical Preserves the privacy of SN users when G is subject to multiple releases CTKGA algorithm R Chen et al [183] Technical Privacy preservation of SN users when G contains outliers and categorical attributes DBSCAN clustering R Narula et al [184] Technical Privacy preservation of identity and emotion-related information in OSN data CNN algorithm R Zitouni et al [185] Technical Privacy preservation by concealing the identity in image data CNN and LSTM R Ahmed et al [186] Technical Privacy preservation by concealing the identity and other SI in images Neural Network R Matheswaran et al [187] Technical Privacy preservation of image data in retrieval and storage in clouds Watermarking R Li et al [188] Technical Both anonymity-and utility-preserving solutions for OSN data GAN Algorithm R Lu et al [189] Technical Privacy preservation by reducing the prediction accuracy of sensitive links in G VGAE and ARVGA R Li et al [190] Technical Privacy preservation using profile, graph structure, and behavioral information GCNN algorithm R Wanda et al [191] Technical Privacy preservation of vulnerable nodes in G using dynamic deep learning CNN architecture R Li et al [192] Technical Privacy preservation of users when a user's job/education-place changes with time Supervised ML R Bioglio et al [193] Technical Privacy preservation of contents in OSN platforms based on sensitivity analysis Deep NN R Hermansson et al [194] Technical Preserves better accuracy for data-mining and analytical tasks from G SVM algorithm R Kalunge et al [195] Technical Preserves better utility (path length and IL) ...…”
Section: Artificial Intelligence-based Graph Anonymization Methodsmentioning
confidence: 99%
“…We summarize and compare the famous AI-based G anonymization techniques used for PPGP in Table 6. [175] Technical Predicts the SI in a G using ML and suggests how to safeguard it NB, SVM, RF S Yin et al [176] Technical Strikes a balance between privacy and utility in distributing G k-means algorithm R Wang et al [177] Technical Privacy preservation of degree information in releasing G k-means algorithm R Ju et al [178] Technical Strong privacy of V in G along with higher accuracy and utility k-means algorithm R Zheng et al [179] Technical Strong privacy of V in G and fewer changes to G's structure GNN algorithm R Paul et al [180] Technical Preserves the structural properties of G in anonymization process k-means algorithm R Hoang et al [181] Technical Preserves the privacy of SN users modelled via knowledge of G k-ad algorithm R Hoang et al [182] Technical Preserves the privacy of SN users when G is subject to multiple releases CTKGA algorithm R Chen et al [183] Technical Privacy preservation of SN users when G contains outliers and categorical attributes DBSCAN clustering R Narula et al [184] Technical Privacy preservation of identity and emotion-related information in OSN data CNN algorithm R Zitouni et al [185] Technical Privacy preservation by concealing the identity in image data CNN and LSTM R Ahmed et al [186] Technical Privacy preservation by concealing the identity and other SI in images Neural Network R Matheswaran et al [187] Technical Privacy preservation of image data in retrieval and storage in clouds Watermarking R Li et al [188] Technical Both anonymity-and utility-preserving solutions for OSN data GAN Algorithm R Lu et al [189] Technical Privacy preservation by reducing the prediction accuracy of sensitive links in G VGAE and ARVGA R Li et al [190] Technical Privacy preservation using profile, graph structure, and behavioral information GCNN algorithm R Wanda et al [191] Technical Privacy preservation of vulnerable nodes in G using dynamic deep learning CNN architecture R Li et al [192] Technical Privacy preservation of users when a user's job/education-place changes with time Supervised ML R Bioglio et al [193] Technical Privacy preservation of contents in OSN platforms based on sensitivity analysis Deep NN R Hermansson et al [194] Technical Preserves better accuracy for data-mining and analytical tasks from G SVM algorithm R Kalunge et al [195] Technical Preserves better utility (path length and IL) ...…”
Section: Artificial Intelligence-based Graph Anonymization Methodsmentioning
confidence: 99%
“…social network analysis (e.g., graph operations) in multi-party computation process/setting offered by SNs data, researches have turned their attention to devise new and realistic anonymization methods leveraging advanced artificial intelligence (AI) techniques. Li et al [228] designed a deep learning (DL) model that combines multiple factors such as attribute information, graph structure, and behaviour characteristics while avoiding tedious calculation procedures to measure the privacy in SNs. The proposed model considers the deep relationship between all three factors (user attributes information, graph structure, and behaviour characteristics) to accurately obtain the privacy score.…”
Section: Anomaly Detection In Online Social Network With High Detectmentioning
confidence: 99%
“…However, using FSL, it only requires each user to provide 3 to 7 login dialogues. In addition, LSL is also applied to the assessment of personal social privacy status [124]. The intervention of FSL dramatically reduces the dependence on labeled data and manual intervention.…”
Section: Some Industrial Examples Of Lsl Usagementioning
confidence: 99%