Plausible Heterogeneous Graph $k$-Anonymization for Social Networks
نویسندگان
چکیده
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates embedding methods, aiming at learning a continuous vector space for the which is amenable to be adopted in traditional machine algorithms favor representations. Graph methods build an important bridge between social network analysis and analytics as networks naturally generate unprecedented volume continuously. Publishing not only bring benefit public health, disaster response, commercial promotion, many other applications, but also give birth threats that jeopardize each individual's privacy security. Unfortunately, most existing works publishing focus on preserving structure less attention paid issues inherited from networks. To specific, attackers can infer presence sensitive relationship two individuals by training predictive model exposed embedding. In this paper, we propose novel link-privacy preserved framework using adversarial learning, reduce adversary's prediction accuracy links while persevering sufficient non-sensitive information such topology node attributes Extensive experiments are conducted evaluate proposed ground truth datasets.
منابع مشابه
Utility-Oriented K-Anonymization on Social Networks
“Identity disclosure” problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in nontrivial utility loss. The reason is that the number of the edges modified when anonymizing the social network is the only metric to evaluate utility loss, not considering the fact that different edge modifications have d...
متن کاملk-Anonymization of Social Networks by Vertex Addition
With an abundance of social network data being released, the need to protect sensitive information within these networks has become an important concern of data publishers. In this paper we focus on the popular notion of kanonymization as applied to node degrees in a social network. Given such a network N , the problem we study is to transform N to N , such that the degree of each node in N ′ i...
متن کاملAn Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملClass-based graph anonymization for social network data
The recent rise in popularity of social networks, such as Facebook and MySpace, has created large quantities of data about interactions within these networks. Such data contains many private details about individuals so anonymization is required prior to attempts to make the data more widely available for scientific research. Prior work has considered simple graph data to be anonymized by remov...
متن کاملTowards identity anonymization in social networks
Social networks, online communities, peer-to-peer file sharing and telecommunication systems can be modeled as complex graphs. These graphs are of significant importance in various application domains such as marketing, psychology, epidemiology and homeland security. The management and analysis of these graphs is a recurring theme with increasing interest in the database, data mining and theory...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tsinghua Science & Technology
سال: 2022
ISSN: ['1878-7606', '1007-0214']
DOI: https://doi.org/10.26599/tst.2021.9010083