检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:吕志泉[1] 李昊[2] 张宗福[2] 张敏[2] LV Zhi-quan;LI Hao;ZHANG Zong-fu;ZHANG Min(National Computer Network Emergency Response Technical Team & Coordination Center of China,Beijing 100029,China;Department of TCA,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China)
机构地区:[1]国家计算机网络应急技术处理协调中心,北京100029 [2]中国科学院软件研究所可信计算与信息保障实验室,北京100190
出 处:《计算机科学》2019年第6期143-147,共5页Computer Science
基 金:国家自然科学基金(61402456)资助
摘 要:近年来,社交网络已成为人们日常生活的一部分.社交网络在为人们的社交活动带来便利的同时,也对个人隐私造成了威胁.通常情况下,人们都希望对自身的部分私密社交活动信息进行保护,以阻止亲属、朋友、同事或其他特定群体的访问.较为常见的一种保护措施是以匿名方式进行社交.一些社交网络会为用户提供匿名机制,允许用户以匿名的形式进行部分社交活动,从而将这部分社交活动与主账号分隔开,以达到隐私保护的目的.此外,用户也可以创建额外的账号(小号),并将该账号的属性、朋友关系与主账号进行区别.针对这些保护措施,文中提出了一种基于主题模型的社交网络匿名用户重识别方法.该方法将用户匿名方式(或小号)和非匿名方式(主账号)发布的文本内容进行主题挖掘,并在主题模型的基础上引入时间因素和文本长度因素来构建用户画像,最后通过分析匿名(小号)和非匿名(主账号)用户画像之间的相似度来实现用户身份的重识别.在真实社交网络数据集上的实验表明,该方法能够有效地对社交网络匿名用户或“小号”用户实施身份重识别攻击.Social network has become part of people’s daily life recently,and brings convenience to our social activities.However,it poses threats to our personal privacy at the same time.Usually,people want to protect part of their private social activity information to prevent relatives,friends,colleagues or other specific groups from visiting.One common protective method is to socialize anonymously.And some social networks provide anonymity mechanisms for users,allowing them to hide some private information about social activities,thus separating these social activities from the main account.In addition,users can create alternate accounts and set different attributes,friendships to achieve the same aim.This paper proposed a topic-based re-identification method for social network users to make an attack on these protection mechanisms.The text contents published by anonymous users(or alternate accounts)and non-anonymous users(main accounts)are analyzed based on topic model.And the time factor and text length factor are introduced to construct user profiles in order to improve the accuracy ofthe proposed method.Then the similarity between anonymous and non-anonymous user profiles is analyzed to match their identities.Finally,experiments on real social network dataset show that the proposed method can effectively improve the accuracy of re-identification for users in social networks.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117