Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Identifying the same person across two similar social networks in a unified way

Published: 01 July 2017 Publication History

Abstract

With the increasing popularity of online social networks, people today typically own several such accounts (e.g., Facebook, Twitter, and Flickr). In this scenario, it arises an interesting and challenging problem: how to identify the same person in different social networks, which is known as the network reconciliation problem. Prior work on this problem first assumes that the relationships between users are homogeneous, and then makes use of the local features (degree, common mapped neighbors) to achieve high precision. However, this assumption does not hold in reality since users usually have different tie strengths between each other. In this paper, we remodel the reconciliation problem by considering the users heterogeneous relationships and propose a unified framework called UniRank for incorporating the local features and global features together. Based on UniRank, we design an efficient two-stage network reconciliation algorithm. First, we design a global matching algorithm to explore more seeds with fast speed. Second, for each explored seed, we design a breadth-first strategy based local matching algorithm to match more seeds. Extensive simulations on real-world and synthetic social network datasets show that our algorithm significantly improves the state-of-art algorithm by up to 9X in terms of F1 score even under very rough conditions.

References

[1]
Facebook company info. 2015, URL: http://newsroom.fb.com/company-info/.
[2]
Twitter usage. 2015, URL: https://about.twitter.com/company.
[3]
F. Abel, N. Henze, E. Herder, D. Krause, Interweaving public user profiles on the web, Springer, Big Island, HI, US, 2010.
[4]
L. Backstrom, C. Dwork, J. Kleinberg, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, ACM, 2007.
[5]
M. Bianchini, M. Gori, F. Scarselli, Inside pagerank, ACM Trans. Internet Technol., 5 (2005) 92-128.
[6]
D. Chakrabarti, Y. Zhan, C. Faloutsos, R-mat: a recursive model for graph mining., SIAM, Lake Buena Vista, Florida, US, 2004.
[7]
C.-F. Chiasserint, M. Garetto, E. Leonardi, De-anonymizing scale-free social networks by percolation graph matching, 2015.
[8]
Z. Fu, K. Ren, J. Shu, X. Sun, F. Huang, Enabling personalized search over encrypted outsourced data with efficiency improvement, IEEE Trans. Parallel Distrib. Syst., 27 (2016) 2546-2559.
[9]
Z. Fu, X. Wu, C. Guan, X. Sun, K. Ren, Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement, IEEE Trans. Inf. Forensics Secur., 11 (2016) 2706-2716.
[10]
E. Kazemi, H. S Hamed, M. Grossglauser, Growing a graph matching from a handful of seeds, 2015.
[11]
N. Korula, S. Lattanzi, An efficient reconciliation algorithm for social networks, 7 (2014) 377-388.
[12]
S. Labitzke, I. Taranu, H. Hartenstein, What your friends tell others about you: Low cost linkability of social network profiles, San Diego, CA, USA, 2011.
[13]
J. Li, X. Li, B. Yang, X. Sun, Segmentation-based image copy-move forgery detection scheme, IEEE Trans. Inf. Forensics Secur., 10 (2015) 507-518.
[14]
A. Malhotra, L. Totti, W. Meira Jr, P. Kumaraguru, V. Almeida, Studying user footprints in different online social networks, IEEE Computer Society, 2012.
[15]
A. Narayanan, V. Shmatikov, De-anonymizing social networks, IEEE, 2009.
[16]
S. Nilizadeh, A. Kapadia, Y.-Y. Ahn, Community-enhanced de-anonymization of online social networks, ACM, 2014.
[17]
J. Novak, P. Raghavan, A. Tomkins, Anti-aliasing on the web, ACM, 2004.
[18]
L. Page, S. Brin, R. Motwani, T. Winograd, The Pagerank citation ranking: bringing order to the web, 1998.
[19]
P. Pedarsani, M. Grossglauser, On the privacy of anonymized networks, ACM, 2011.
[20]
Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, Mutual verifiable provable data auditing in public cloud storage, J. Internet Technol., 16 (2015) 318.
[21]
E. Seneta, Non-negative Matrices and Markov Chains, Springer Verlag, New York, US, 2006.
[22]
M. Tinghuai, Z. Jinjuan, T. Meili, T. Yuan, A.-D. Abdullah, A.-R. Mznah, L. Sungyoung, Social network and tag sources based augmenting collaborative recommender system, IEICE Trans. Inf. Syst., 98 (2015) 902-910.
[23]
B. Viswanath, A. Mislove, M. Cha, K.P. Gummadi, On the evolution of user interaction in Facebook, ACM, 2009.
[24]
Z. Xia, X. Wang, X. Sun, B. Wang, Steganalysis of least significant bit matching using multi-order differences, Secur. Commun. Netw., 7 (2014) 1283-1291.
[25]
Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, K. Ren, A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, IEEE Trans. Inf. Forensics Secur., 11 (2016) 2594-2608.
[26]
L. Yartseva, M. Grossglauser, On the performance of percolation graph matching, ACM, 2013.
[27]
C. Yuan, X. Sun, R. Lv, Fingerprint liveness detection based on multi-scale LPQ and PCA, China Commun., 13 (2016) 60-65.
[28]
R. Zafarani, H. Liu, Connecting corresponding identities across communities, 2009.
[29]
R. Zafarani, H. Liu, Connecting users across social media sites: a behavioral-modeling approach, ACM, 2013.
[30]
Y. Zhang, X. Sun, B. Wang, Efficient algorithm for k-barrier coverage based on integer linear programming, Chin. Commun., 13 (2016) 16-23.
[31]
Y. Zhang, J. Tang, Z. Yang, J. Pei, P.S. Yu, Cosnet: connecting heterogeneous social networks with local and global consistency, ACM, 2015.
[32]
F. Zhangjie, S. Xingming, L. Qi, Z. Lu, S. Jiangang, Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing, IEICE Trans. Commun., 98 (2015) 190-200.
[33]
Z. Zhou, Y. Wang, Q. Wu, C.-N. Yang, X. Sun, Effective and efficient global context verification for image copy detection, IEEE Trans. Inf. Forensics Secur. (2016) 1-10.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Information Sciences: an International Journal
Information Sciences: an International Journal  Volume 394, Issue C
July 2017
295 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 July 2017

Author Tags

  1. Globally
  2. Identifying
  3. Locally
  4. Network reconciliation
  5. Social network

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Identity Alignment Method based on Online TrackingCompanion Proceedings of the ACM Web Conference 202410.1145/3589335.3651469(609-612)Online publication date: 13-May-2024
  • (2023)When Behavior Analysis Meets Social Network AlignmentIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.319798535:7(7590-7607)Online publication date: 1-Jul-2023
  • (2022)MAUILInformation Sciences: an International Journal10.1016/j.ins.2022.02.023593:C(527-545)Online publication date: 1-May-2022
  • (2022)Triple-layer attention mechanism-based network embedding approach for anchor link identification across social networksNeural Computing and Applications10.1007/s00521-021-06556-934:4(2811-2829)Online publication date: 1-Feb-2022
  • (2021)Association Analysis of Private Information in Distributed Social Networks Based on Big DataWireless Communications & Mobile Computing10.1155/2021/11811292021Online publication date: 1-Jan-2021
  • (2021)A generation probability based percolation network alignment methodWorld Wide Web10.1007/s11280-021-00893-424:5(1511-1531)Online publication date: 1-Sep-2021
  • (2020)A Novel Approach using Context Matching Algorithm and Knowledge Inference for User Identification in Social NetworksProceedings of the 4th International Conference on Machine Learning and Soft Computing10.1145/3380688.3380708(149-153)Online publication date: 17-Jan-2020
  • (2020)Reconciling Multiple Social Networks Effectively and Efficiently: An Embedding ApproachIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.292978633:1(224-238)Online publication date: 7-Dec-2020
  • (2020)Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.275424917:2(350-362)Online publication date: 12-Mar-2020
  • (2019)A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph ModelMobile Networks and Applications10.1007/s11036-019-01456-825:4(1364-1375)Online publication date: 17-Dec-2019
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media