Chinese Journal of Network and Information Security ›› 2020, Vol. 6 ›› Issue (4): 104-108.doi: 10.11959/j.issn.2096-109x.2020045

• Papers • Previous Articles     Next Articles

De-anonymiation method for networks based on DeepLink

Pei WANG,Yan JIA,Aiping LI(),Qianyue JIANG   

  1. College of Computer,National University of Defense Technology,Changsha 410073,China
  • Revised:2019-09-17 Online:2020-08-15 Published:2020-08-13
  • Supported by:
    The National Key R&D Program of China(2017YFB0802204);The National Key R&D Program of China(2016YFB0800303);The National Key R&D Program of China(2017YFB0803301);The National Key R&D Program of China(2016QY03D0603);The National Key R&D Program of China(2016QY03D0601);The National Key R&D Program of China(2016QY01W0101);The National Natural Science Foundation of China(61732004);The National Natural Science Foundation of China(61732022);The National Natural Science Foundation of China(61502517);The National Natural Science Foundation of China(61472433);The National Natural Science Foundation of China(61672020);The National Natural Science Foundation of China(U1803263);DongGuan Innovative Research Team Program(2018607201008)

Abstract:

Existing de-anonymization technologies are mainly based on the network structure.To learn and express network structure is the key step of de-anonymization.The purpose of the user identity linkage is to detect the same user from different social networking platforms.DeepLink is a cross-social network user alignment technology.It learns the structural of the social networks and align anchor nodes through deep neural networks.DeepLink was used to identify de-anonymization social networks,and the results outperforms the traditional methods.

Key words: anonymization, de-anonymization, privacy, social network, graph data

CLC Number: 

No Suggested Reading articles found!