Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social relationship hiding method based on attack node similarity

A technology of social relations and attacking nodes, which is applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as hidden failures, lower key link recognition rates, and lower accuracy of link prediction algorithms to achieve good concealment effects Effect

Active Publication Date: 2018-08-24
ZHEJIANG UNIV OF TECH
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, some key links in social networks need to be hidden, but if a third party can predict the hidden links through the network structure, it means that the hiding is invalid, and the user's social privacy is also leaked.
Therefore, the problem can be transformed into the security problem of the link prediction algorithm, that is, how to reduce the accuracy of the link prediction algorithm by adding an appropriate amount of noise links to the social network, thereby reducing the recognition rate of key links and protecting the privacy of users to the greatest extent possible. Safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social relationship hiding method based on attack node similarity
  • Social relationship hiding method based on attack node similarity
  • Social relationship hiding method based on attack node similarity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described below in conjunction with the accompanying drawings.

[0020] refer to figure 1 , a social relationship concealment method based on the similarity of attacking nodes, including the following steps:

[0021] S1: Assuming an unweighted and undirected network G(V,E), divide the network structure data into a training set G T and the test set G V , where the training set is the disturbance object, and the test set is used to evaluate the effectiveness of the algorithm, that is, the link prediction accuracy and AUC are used to measure the effect of specific disturbances and random disturbances;

[0022] S2: According to the resource allocation index RA, calculate the similarity value of all node pairs (i, j) in the training set The resource allocation metrics are defined as follows:

[0023]

[0024] where Γ(i) represents the neighbor set of node i, d k Indicates the degree value of node k;

[0025] S3: In order to ens...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a social relationship hiding method based on attack node similarity. The method comprises the following steps: 1) dividing network structure data into a training set and a testset; 2) calculating similarity values of all node pairs in the training set according to resource allocation indicators; 3) traversing all target node pairs in a descending order of the similarity values, and if the target node pairs have connected edges in the training set, deleting the connected edges; if the target node pairs have connected edges in the training set, selecting a common neighbornode with the smallest similarity value of the target node pairs, and deleting the connected edge of the node and the target node; if the target node pairs have no connected edges, selecting neighbornodes of a non common neighbor with the smallest median value of the target node pairs, and adding the connection edge of the node and the target node; and if the total number of adding and deletingreaches to the limitation, stopping the execution, and outputting a result. According to the social relationship hiding method provided by the invention, the connected edge disturbance of the networkis performed by using the node similarity to achieve a better hiding effect than random disturbance.

Description

technical field [0001] The invention relates to the fields of network science and link prediction, in particular to a social relationship concealment method based on the similarity of attacking nodes. Background technique [0002] With the development of the mobile Internet and the rise of various social APPs, people are becoming more and more accustomed to interacting with friends in virtual networks. In the era of big data, data contains infinite value. At the same time, users' personal privacy data is also exposed on the Internet, and these sensitive data are not only important to users, but also to enterprises. Enterprises have the responsibility and obligation to protect users' privacy information. The method of the present invention looks at the user's social privacy from the perspective of link prediction. For example, some key links in social networks need to be hidden, but if a third party can predict the hidden links through the network structure, it means that t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/12H04L41/142H04L41/145H04L63/0407H04L63/0421
Inventor 宣琦赵明浩郑永立傅晨波俞山青阮中远陈晋音
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products