Proceedings of the 29th ACM International Conference on Information &Amp; Knowledge Management 2020
DOI: 10.1145/3340531.3411970
|View full text |Cite
|
Sign up to set email alerts
|

Seed-free Graph De-anonymiztiation with Adversarial Learning

Abstract: The huge amount of graph data are published and shared for research and business purposes, which brings great benefit for our society. However, user privacy is badly undermined even though user identity can be anonymized. Graph de-anonymization to identify nodes from an anonymized graph is widely adopted to evaluate users' privacy risks. Most existing de-anonymization methods which are heavily reliant on side information (e.g., seeds, user profiles, community labels) are unrealistic due to the difficulty of co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 28 publications
0
12
0
Order By: Relevance
“…Evaluation and Analysis.As shown in Tables4, 5, and 6, the accuracy, recall, and macro-F1 of our method DAHGCN are better than those of other models. It is also easy for us to draw this conclusion fromFigures 6,7,8,9,10, and…”
mentioning
confidence: 84%
See 1 more Smart Citation
“…Evaluation and Analysis.As shown in Tables4, 5, and 6, the accuracy, recall, and macro-F1 of our method DAHGCN are better than those of other models. It is also easy for us to draw this conclusion fromFigures 6,7,8,9,10, and…”
mentioning
confidence: 84%
“…With the rapid development of the Internet, the Internet of Things, and cloud computing, data in each field has increased tremendously, e.g., science, technology, software industry, and business. The Internet of things here means machines embedded with iBeacon or sensors that collect and store data for analysis [10][11][12][13]. The wave of big data generated by the Internet of things will drive the growing demand for data analysis.…”
Section: Introductionmentioning
confidence: 99%
“…The graph data (e.g., social networks) promotes the research and applications of data mining, but privacy leakage in graph data is also becoming more serious during data processing and sharing procedures. Although the traditional anonymization methods for the graph data can balance data utility and data privacy to some extent, these methods are vulnerable to the state-of-the-art inference approaches using graph neural networks [71]. Therefore, more powerful strategies are desired to defend inference attacks for graph data.…”
Section: Graph Data Privacymentioning
confidence: 99%
“…In order to predict the time length T of the physical packet to be transmitted in the next time, machine learning will be applied. Typical machine learning algorithms include linear regression, logistic regression, ridge regression, and Wireless Communications and Mobile Computing support vector regression [24][25][26][27][28][29]. Linear regression [24] uses least square methods as cost function and optimizes the target model by Newton iteration.…”
Section: Related Workmentioning
confidence: 99%