IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8486260
|View full text |Cite
|
Sign up to set email alerts
|

Social Network De-anonymization with Overlapping Communities: Analysis, Algorithm and Experiments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…The main drawback of this study is the assumption of disjoint communities, which fails to reflect the real-world situations. Wu et al [181] extend Fu et al's study by considering overlapping communities. In contrast to Fu et al's work [58], which uses Maximum a Posteriori estimation to find the correct mappings, Wu et al introduces a new cost function, Minimum Mean Square Error, which minimizes the expected number of mismatched users by incorporating all possible true mappings.…”
Section: Theoretical Analysis and De-anonymizationmentioning
confidence: 81%
“…The main drawback of this study is the assumption of disjoint communities, which fails to reflect the real-world situations. Wu et al [181] extend Fu et al's study by considering overlapping communities. In contrast to Fu et al's work [58], which uses Maximum a Posteriori estimation to find the correct mappings, Wu et al introduces a new cost function, Minimum Mean Square Error, which minimizes the expected number of mismatched users by incorporating all possible true mappings.…”
Section: Theoretical Analysis and De-anonymizationmentioning
confidence: 81%
“…pre-identified node pairs that are known to be correctly matched. However, in many situations, it is difficult to obtain such seed nodes due to the limited access to user profiles [9] [24]. Pedarsani and Grossglauer [19] first studied the seedless de-anonymization problem in the context of Erdős-Rènyi model, and they took the number of mismatched edge as the objective function.…”
Section: Related Work 21 De-anonymization Algorithmsmentioning
confidence: 99%
“…Pedarsani and Grossglauer [19] first studied the seedless de-anonymization problem in the context of Erdős-Rènyi model, and they took the number of mismatched edge as the objective function. A different cost function based on Maximum a Posterior (MAP) was proposed in [17] and also used in [9] [24]. Recent works for correlated Erdős-Rènyi networks were reported in [20] [4]; Nitish and Silvio also proposed algorithm in [14] for the preferential attachment (PA) model.…”
Section: Related Work 21 De-anonymization Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al [40] proposed a seedless de-anonymization method incorporating multi-hops neighborhood information and exploiting an improved machine learning technique for matching. Wu et al [41] provided a systematic study on the effect of overlapping communities on deanonymization without seed, aiming at minimizing the de-anonymizaiton error.…”
Section: Structural Attacks Without Seedmentioning
confidence: 99%