2018
DOI: 10.1038/s41562-017-0290-3
|View full text |Cite
|
Sign up to set email alerts
|

Hiding individuals and communities in a social network

Abstract: The Internet and social media have fueled enormous interest in social network analysis. New tools continue to be developed and used to analyse our personal connections, with particular emphasis on detecting communities or identifying key individuals in a social network. This raises privacy concerns that are likely to exacerbate in the future. With this in mind, we ask the question: Can individuals or groups actively manage their connections to evade social network analysis tools? By addressing this question, t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

3
160
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 198 publications
(172 citation statements)
references
References 50 publications
3
160
0
2
Order By: Relevance
“…In particular, ||δ || 0 is the number of edges added or removed by the attacker. Two attacks: An attacker can manipulate the detected communities via adversarial structural perturbation [8,9,13,28,36]. Specifically, there are two types of attacks to community detection:…”
Section: Attacks To Community Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, ||δ || 0 is the number of edges added or removed by the attacker. Two attacks: An attacker can manipulate the detected communities via adversarial structural perturbation [8,9,13,28,36]. Specifically, there are two types of attacks to community detection:…”
Section: Attacks To Community Detectionmentioning
confidence: 99%
“…However, multiple recent studies showed that community detection is vulnerable to adversarial structural perturbations [8,9,13,28,36]. Specifically, via adding or removing a small number of carefully selected edges in a graph, an attacker can manipulate the detected communities.…”
mentioning
confidence: 99%
“…We believe that our findings in this study raises a large concern about protecting the privacy of social media users, where their beliefs and leanings could be easily predicted using any of the footprint signals they leave online. This should motivate social media networks owners and designers to develop methods for protecting the privacy of their users [51].…”
mentioning
confidence: 99%
“…Therefore, in the following experiments we set n = 0.05N . We compare our GTA and ZO-GTA methods with DICE ('delete edges internally, connect externally) [20], CE-PGD and CW-PGD [13]. We follow the hyper parameters and experimental settings as given in in [13] for a fair comparison.…”
Section: Attack Performancementioning
confidence: 99%