2021
DOI: 10.1016/j.knosys.2020.106674
|View full text |Cite
|
Sign up to set email alerts
|

Towards link inference attack against network structure perturbation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 63 publications
0
16
0
Order By: Relevance
“…Therefore, in network science, link prediction is a paradigmatic and fundamental problem with long attractivity and vitality. Beyond an algorithm predicting missing and future links, link prediction is also a powerful analyzing tool, which has already been utilized in evaluating and inferring network evolving mechanisms ( Wang et al., 2012 ; Zhang et al., 2015 ; Zhang, 2017 ), testing the privacy-protection algorithms (as an attaching method) ( Xian et al., 2021 ), evaluating and designing network embedding algorithms ( Dehghan-Kooshkghazi et al., 2021 ; Gu et al., 2021 ), and so on. Though the last decade has witnessed plentiful and substantial achievements, the study of link prediction is just unfolding and more efforts are required toward a full picture of how links do emerge and vanish.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, in network science, link prediction is a paradigmatic and fundamental problem with long attractivity and vitality. Beyond an algorithm predicting missing and future links, link prediction is also a powerful analyzing tool, which has already been utilized in evaluating and inferring network evolving mechanisms ( Wang et al., 2012 ; Zhang et al., 2015 ; Zhang, 2017 ), testing the privacy-protection algorithms (as an attaching method) ( Xian et al., 2021 ), evaluating and designing network embedding algorithms ( Dehghan-Kooshkghazi et al., 2021 ; Gu et al., 2021 ), and so on. Though the last decade has witnessed plentiful and substantial achievements, the study of link prediction is just unfolding and more efforts are required toward a full picture of how links do emerge and vanish.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, in network science, link prediction is a paradigmatic and fundamental problem with long attractivity and vitality. Beyond an algorithm predicting missing and future links, link prediction is also a powerful analyzing tool, which has already been utilized in evaluating and inferring network evolving mechanisms [7][8][9] [97], testing the privacy-protection algorithms (as an attaching method) [148], evaluating and designing network embedding algorithms [149][150], and so on.…”
mentioning
confidence: 99%
“…These attacks are categorized as identity disclosure, sensitive attribute disclosure, and sensitive link disclosure. Identity disclosure [6] is a type of breach that occurs when an adversary reveals the individual behind the record. Sensitive attribute disclosure collects sensitive or confidential details about the individual [7].…”
Section: Motivational Examplementioning
confidence: 99%
“…Privacy preservation is widely considered an important topic for data publishing, and many models are proposed as well as many effective algorithms. However, these methods cannot be directly applied to social graphs as they are ideally proposed for relational datasets and graph anonymization is more complicated than relational data [6]. The reasons are listed below:…”
Section: Challengesmentioning
confidence: 99%
“…Although most OSNs provide the option or privacy setting for the protection of user privacy, third parties or malicious users can still manage to infer users' private attributes through various privacy inference methods. [1][2][3] Such violations of privacy would pose a serious threat to the individual right of users. To develop effective solutions that can protect user privacy, it is necessary to understand how inference attacks can be effectively launched and what factors play the important role in such attacks.…”
Section: Introductionmentioning
confidence: 99%