{"title":"Generating-Based Attacks to Online Social Networks","authors":"Tianchong Gao;Yucheng Bian;Feng Li;Agnideven Palanisamy Sundar","doi":"10.1109/TCSS.2024.3461710","DOIUrl":null,"url":null,"abstract":"Online social network (OSN) privacy leakage problem addresses more and more users’ concerns. Studying the problem from attackers’ view could tell us how to prevent further data leakage. Currently, attackers mainly focus on mapping identities between their background knowledge and the published data to collect useful information. However, it becomes difficult to find the global optimal mapping strategy because of the complexity of the OSN data. This article proposes a novel generating-based attack on OSN data, no longer restricted to mapping-based information collection. Generally, the proposed scheme learns OSN properties from the attackers’ background knowledge and employs the knowledge to fill the unknown area in the published data. The proposed scheme employs a generative adversarial network to ensure the similarity between the generated graph and the published data. The conditional information is also added in the generation process such that the generated graph is restricted to the conditions under attackers’ background knowledge. Experimental results show that the proposed scheme successfully infer private information with real-world OSN datasets.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 6","pages":"7881-7891"},"PeriodicalIF":4.5000,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Computational Social Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10734667/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
引用次数: 0
Abstract
Online social network (OSN) privacy leakage problem addresses more and more users’ concerns. Studying the problem from attackers’ view could tell us how to prevent further data leakage. Currently, attackers mainly focus on mapping identities between their background knowledge and the published data to collect useful information. However, it becomes difficult to find the global optimal mapping strategy because of the complexity of the OSN data. This article proposes a novel generating-based attack on OSN data, no longer restricted to mapping-based information collection. Generally, the proposed scheme learns OSN properties from the attackers’ background knowledge and employs the knowledge to fill the unknown area in the published data. The proposed scheme employs a generative adversarial network to ensure the similarity between the generated graph and the published data. The conditional information is also added in the generation process such that the generated graph is restricted to the conditions under attackers’ background knowledge. Experimental results show that the proposed scheme successfully infer private information with real-world OSN datasets.
期刊介绍:
IEEE Transactions on Computational Social Systems focuses on such topics as modeling, simulation, analysis and understanding of social systems from the quantitative and/or computational perspective. "Systems" include man-man, man-machine and machine-machine organizations and adversarial situations as well as social media structures and their dynamics. More specifically, the proposed transactions publishes articles on modeling the dynamics of social systems, methodologies for incorporating and representing socio-cultural and behavioral aspects in computational modeling, analysis of social system behavior and structure, and paradigms for social systems modeling and simulation. The journal also features articles on social network dynamics, social intelligence and cognition, social systems design and architectures, socio-cultural modeling and representation, and computational behavior modeling, and their applications.