论文标题

社会隐私的对抗性:一种降低用户身份联系的中毒策略

Adversarial for Social Privacy: A Poisoning Strategy to Degrade User Identity Linkage

论文作者

Shao, Jiangli, Wang, Yongqing, Shi, Boshen, Gao, Hao, Shen, Huawei, Cheng, Xueqi

论文摘要

近年来,社交网络上的隐私问题已广泛讨论。旨在在不同社交网络中查找相应用户的用户身份链接(UIL)任务,如果不道德应用,将对隐私构成威胁。可以通过连接的身份检测到敏感的用户信息。解决此问题的一个有前途且新颖的解决方案是设计一种对抗性策略,以降低UIL模型的匹配性能。但是,大多数现有对图表的对抗攻击都是为在单个网络中工作的模型而设计的,而UIL是跨网络学习任务。同时,针对UIL的隐私保护在现实情况下单方面起作用,即服务提供商只能在其自己的网络中添加扰动,以保护其用户免于链接。为了应对这些挑战,本文提出了一种新型的对抗攻击策略,该策略可以毒管一个目标网络,以防止其节点通过UIL算法链接到其他网络。具体而言,我们从内核拓扑一致性的角度将UIL问题重新定位,并将攻击目标转换为最大化攻击前后目标网络内的结构变化。然后,在边缘装饰空间上使用Earth Mover的距离(EMD)定义了一个新颖的图内核。在效率方面,通过贪婪的搜索和用下限代替EMD提出了快速攻击策略。三个现实世界数据集中的结果表明,提出的攻击最能蒙蔽广泛的UIL模型,并在攻击效率和不可智能之间达到平衡。

Privacy issues on social networks have been extensively discussed in recent years. The user identity linkage (UIL) task, aiming at finding corresponding users across different social networks, would be a threat to privacy if unethically applied. The sensitive user information might be detected through connected identities. A promising and novel solution to this issue is to design an adversarial strategy to degrade the matching performance of UIL models. However, most existing adversarial attacks on graphs are designed for models working in a single network, while UIL is a cross-network learning task. Meanwhile, privacy protection against UIL works unilaterally in real-world scenarios, i.e., the service provider can only add perturbations to its own network to protect its users from being linked. To tackle these challenges, this paper proposes a novel adversarial attack strategy that poisons one target network to prevent its nodes from being linked to other networks by UIL algorithms. Specifically, we reformalize the UIL problem in the perspective of kernelized topology consistency and convert the attack objective to maximizing the structural changes within the target network before and after attacks. A novel graph kernel is then defined with Earth mover's distance (EMD) on the edge-embedding space. In terms of efficiency, a fast attack strategy is proposed by greedy searching and replacing EMD with its lower bound. Results on three real-world datasets indicate that the proposed attacks can best fool a wide range of UIL models and reach a balance between attack effectiveness and imperceptibility.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源