Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3583780.3615084acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article
Open access

TOAK: A Topology-oriented Attack Strategy for Degrading User Identity Linkage in Cross-network Learning

Published: 21 October 2023 Publication History

Abstract

Privacy concerns on social networks have received extensive attention in recent years. The task of user identity linkage (UIL), which aims to identify corresponding users across different social networks, poses a threat to privacy if applied unethically. Sensitive user information would be inferred with cross-network identity linkages. A feasible solution to this issue is to design an adversarial strategy that degrades the matching performance of UIL models. Nevertheless, most of the current adversarial attacks on graphs are tailored towards models working within a single network, failing to account for the challenges presented by cross-network learning tasks such as UIL. Also, in real-world scenarios, the adversarial strategy against UIL has more constraints as service providers can only add perturbations to their own networks. To tackle these challenges, this paper proposes a novel poisoning strategy to prevent nodes in a target network from being linked to other networks by UIL algorithms. Specifically, the UIL problem is formalized in the kernelized topology consistency perspective, and the objective is formulated as maximizing the structural variations in the target network before and after modifications. To achieve this, a novel graph kernel is defined based on earth mover's distance (EMD) in the edge-embedding space. In terms of efficiency, a fast attack strategy is proposed using greedy searching and a lower bound approximation of EMD. Results on three real-world datasets demonstrate that the proposed method outperforms six baselines and reaches a balance between effectiveness and imperceptibility while being efficient.

References

[1]
Aleksandar Bojchevski and Stephan Günnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In ICML. PMLR, 695--704.
[2]
Baiyang Chen and Xiaoliang Chen. 2022. MAUIL: Multilevel attribute embedding for semisupervised user identity linkage. Inf. Sci., Vol. 593 (2022), 527--545.
[3]
Siyuan Chen, Jiahai Wang, Xin Du, and Yanqing Hu. 2020. A Novel Framework with Information Fusion and Neighborhood Enhancement for User Identity Linkage. In ECAI 2020, Vol. 325. IOS Press, 1754--1761.
[4]
Xiaolin Chen, Xuemeng Song, Guozhen Peng, Shanshan Feng, and Liqiang Nie. 2021. Adversarial-Enhanced Hybrid Graph Network for User Identity Linkage. In SIGIR '21. ACM, 1084--1093.
[5]
Xiaokai Chu, Xinxin Fan, Di Yao, Zhihua Zhu, Jianhui Huang, and Jingping Bi. 2019. Cross-Network Embedding for Multi-Network Alignment. In The ACM Web Conference.
[6]
Xiaokai Chu, Xinxin Fan, Zhihua Zhu, and Jingping Bi. 2021. Variational Cross-Network Embedding for Anonymized User Identity Linkage. In ACM International Conference on Information and Knowledge Management.
[7]
Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. In ICML. PMLR, 1115--1124.
[8]
Manlio De Domenico, Andrea Lancichinetti, Alex Arenas, and Martin Rosvall. 2015. Identifying modular flows on multilayer networks reveals highly overlapping organization in interconnected systems. Physical Review X, Vol. 5, 1 (2015).
[9]
Palash Dey and Sourav Medya. 2019. Manipulating node similarity measures in networks. arXiv preprint arXiv:1910.11529 (2019).
[10]
Yuxiao Dong, Jie Tang, Sen Wu, Jilei Tian, Nitesh V Chawla, Jinghai Rao, and Huanhuan Cao. 2012. Link prediction and recommendation across heterogeneous social networks. In ICDM. IEEE, 181--190.
[11]
Xingbo Du, Junchi Yan, and Hongyuan Zha. 2019. Joint Link Prediction and Network Alignment via Cross-graph Embedding. In IJCAI 2019. 2251--2257.
[12]
Negin Entezari, Saba A. Al-Sayouri, Amirali Darvishzadeh, and Evangelos E. Papalexakis. 2020. All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs. In WSDM '20.
[13]
Shaohua Fan, Junxiong Zhu, Xiaotian Han, Chuan Shi, Linmei Hu, Biyu Ma, and Yongliang Li. 2019. Metapath-guided heterogeneous graph neural network for intent recommendation. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2478--2486.
[14]
Jie Feng, Mingyang Zhang, Huandong Wang, Zeyu Yang, Chao Zhang, Yong Li, and Depeng Jin. 2019. DPLink: User Identity Linkage via Deep Neural Network From Heterogeneous Mobility Data. In The ACM Web Conference. ACM, 459--469.
[15]
Aasa Feragen, Francois Lauze, and Soren Hauberg. 2015. Geodesic exponential kernels: When curvature and linearity conflict. In CVPR. 3032--3042.
[16]
Matthias Fey, Jan Eric Lenssen, Christopher Morris, Jonathan Masci, and Nils M. Kriege. 2020. Deep Graph Matching Consensus. In ICLR 2020.
[17]
David Haussler. 1999. Convolution kernels on discrete structures. Technical Report. Technical report, Department of Computer Science, University of California.
[18]
Mark Heimann, Haoming Shen, Tara Safavi, and Danai Koutra. 2018. Regal: Representation learning-based graph alignment. In ACM International Conference on Information and Knowledge Management. 117--126.
[19]
Petter Holme and Beom Jun Kim. 2002. Growing scale-free networks with tunable clustering. Phys. Rev. E, Vol. 65 (Jan 2002), 026107. Issue 2. https://doi.org/10.1103/PhysRevE.65.026107
[20]
Thanh Trung Huynh, Van Vinh Tong, Thanh Tam Nguyen, Hongzhi Yin, Matthias Weidlich, and Nguyen Quoc Viet Hung. 2020. Adaptive Network Alignment with Unsupervised and Multi-order Convolutional Networks. In ICDE 2020.
[21]
Thomas N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308 (2016).
[22]
Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR 2017.
[23]
Xiangnan Kong, Jiawei Zhang, and Philip S Yu. 2013. Inferring anchor links across multiple heterogeneous social networks. In ACM International Conference on Information and Knowledge Management. 179--188.
[24]
Danai Koutra, Hanghang Tong, and David Lubensky. 2013. Big-align: Fast bipartite graph alignment. In ICDM. IEEE, 389--398.
[25]
Chaozhuo Li, Senzhang Wang, Yukun Wang, Philip S. Yu, Yanbo Liang, Yun Liu, and Zhoujun Li. 2019. Adversarial Learning for Weakly-Supervised Social Network Alignment. In The AAAI Conference on Artificial Intelligence. AAAI Press, 996--1003.
[26]
Xiaoxue Li, Yanmin Shang, Yanan Cao, Yangxi Li, Jianlong Tan, and Yanbing Liu. 2020. Type-Aware Anchor Link Prediction across Heterogeneous Networks Based on Graph Attention Network. In The AAAI Conference on Artificial Intelligence, Vol. 34. 147--155.
[27]
Lu Lin, Ethan Blaser, and Hongning Wang. 2022. Graph Structural Attack by Perturbing Spectral Distance. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 989--998.
[28]
Li Liu, William K Cheung, Xin Li, and Lejian Liao. 2016. Aligning Users across Social Networks Using Network Embedding. In Ijcai. 1774--1780.
[29]
Tong Man, Huawei Shen, Shenghua Liu, Xiaolong Jin, and Xueqi Cheng. 2016. Predict anchor links across social networks via an embedding approach. In Ijcai.
[30]
Sadegh Nobari, Panagiotis Karras, HweeHwa Pang, and Sté phane Bressan. 2014. L-opacity: Linkage-Aware Graph Anonymization. In EDBT. 583--594.
[31]
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank citation ranking: Bringing order to the web. Technical Report. Stanford InfoLab.
[32]
Jin-Duk Park, Cong Tran, Won-Yong Shin, and Xin Cao. 2022. Grad-Align: Gradual Network Alignment via Graph Neural Networks (Student Abstract). In The AAAI Conference on Artificial Intelligence. AAAI Press, 13027--13028.
[33]
Shichao Pei, Lu Yu, Guoxian Yu, and Xiangliang Zhang. 2022. Graph Alignment with Noisy Supervision. In The ACM Web Conference. ACM, 1104--1114.
[34]
Aria Rezaei and Jie Gao. 2019. On Privacy of Socially Contagious Attributes. In ICDM. 1294--1299.
[35]
Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. 2000. The earth mover's distance as a metric for image retrieval. International journal of computer vision, Vol. 40, 2 (2000), 99--121.
[36]
Bernhard Schölkopf. 2000. The kernel trick for distances. Advances in neural information processing systems, Vol. 13 (2000).
[37]
Yanmin Shang, Zhezhou Kang, Yanan Cao, Dongjie Zhang, Yang Li, Yangxi Li, and Yanbing Liu. 2019. PAAE: A Unified Framework for Predicting Anchor Links with Adversarial Embedding. In ICME 2019. IEEE, 682--687.
[38]
Jiangli Shao, Huawei Shen, Qi Cao, and Xueqi Cheng. 2019. Temporal Convolutional Networks for Popularity Prediction of Messages on Social Medias. In CCIR 2019 (Lecture Notes in Computer Science, Vol. 11772). Springer, 135--147.
[39]
Jiangli Shao, Yongqing Wang, Hao Gao, Huawei Shen, Yangyang Li, and Xueqi Cheng. 2021. Locate Who You Are: Matching Geo-location to Text for User Identity Linkage. In CIKM '21. ACM, 3413--3417.
[40]
Jiangli Shao, Yongqing Wang, Hao Gao, Boshen Shi, Huawei Shen, and Xueqi Cheng. 2023. AsyLink: user identity linkage from text to geo-location via sparse labeled data. Neurocomputing, Vol. 515 (2023), 174--184.
[41]
Kai Shu, Suhang Wang, Jiliang Tang, Reza Zafarani, and Huan Liu. 2017. User identity linkage across online social networks: A review. Acm Sigkdd Explorations Newsletter, Vol. 18, 2 (2017), 5--17.
[42]
Rohit Singh, Jinbo Xu, and Bonnie Berger. 2008. Global alignment of multiple protein interaction networks with application to functional orthology detection. Proceedings of the National Academy of Sciences, Vol. 105, 35 (2008), 12763--12768.
[43]
Aaron Smalter, Jun Huan, and Gerald Lushington. 2008. Gpm: A graph pattern matching kernel with diffusion for chemical compound classification. In 2008 8th IEEE International Conference on BioInformatics and BioEngineering. IEEE, 1--6.
[44]
Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Philip S Yu, Lifang He, and Bo Li. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528 (2018).
[45]
Matteo Togninalli, Elisabetta Ghisu, Felipe Llinares-López, Bastian Rieck, and Karsten Borgwardt. 2019. Wasserstein weisfeiler-lehman graph kernels. Advances in Neural Information Processing Systems, Vol. 32 (2019).
[46]
Huynh Thanh Trung, Nguyen Thanh Toan, Tong Van Vinh, Hoang Thanh Dat, Duong Chi Thang, Nguyen Quoc Viet Hung, and Abdul Sattar. 2020. A comparative study on network alignment techniques. Expert Systems with Applications, Vol. 140 (2020), 112883.
[47]
Yaqing Wang, Chunyan Feng, Ling Chen, Hongzhi Yin, Caili Guo, and Yunfei Chu. 2019a. User identity linkage across social networks via linked heterogeneous network embedding. World Wide Web, Vol. 22, 6 (2019), 2611--2632.
[48]
Yongqing Wang, Huawei Shen, Jinhua Gao, and Xueqi Cheng. 2019b. Learning Binary Hash Codes for Fast Anchor Link Retrieval across Networks. In The ACM Web Conference.
[49]
Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and Philip S. Yu. 2021. A Comprehensive Survey on Graph Neural Networks. IEEE Trans. Neural Networks Learn. Syst., Vol. 32, 1 (2021), 4--24.
[50]
Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang. 2021. Graph backdoor. In USENIX Security 21. 1523--1540.
[51]
Hongteng Xu, Dixin Luo, and Lawrence Carin. 2019. Scalable Gromov-Wasserstein Learning for Graph Partitioning and Matching. In NeurIPS 2019.
[52]
Yuchen Yan, Si Zhang, and Hanghang Tong. 2021. BRIGHT: A bridging algorithm for network alignment. In The ACM Web Conference. 3907--3917.
[53]
Pinar Yanardag and SVN Vishwanathan. 2015. Deep graph kernels. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
[54]
Qianyi Zhan, Jiawei Zhang, Philip Yu, and Junyuan Xie. 2017. Community detection for emerging social networks. World Wide Web, Vol. 20, 6 (2017), 1409--1441.
[55]
Jiawei Zhang, Xiangnan Kong, and Philip S Yu. 2014. Transferring heterogeneous links across location-based social networks. In WSDM. 303--312.
[56]
Sen Zhang, Weiwei Ni, and Nan Fu. 2020a. Community Preserved Social Graph Publishing with Node Differential Privacy. In ICDM. 1400--1405.
[57]
Si Zhang and Hanghang Tong. 2016. Final: Fast attributed network alignment. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1345--1354.
[58]
Si Zhang, Hanghang Tong, Long Jin, Yinglong Xia, and Yunsong Guo. 2021. Balancing Consistency and Disparity in Network Alignment. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
[59]
Zijie Zhang, Zeru Zhang, Yang Zhou, Yelong Shen, Ruoming Jin, and Dejing Dou. 2020b. Adversarial attacks on deep graph matching. Advances in Neural Information Processing Systems, Vol. 33 (2020), 20834--20851.
[60]
Zexuan Zhong, Yong Cao, Mu Guo, and Zaiqing Nie. 2018. CoLink: An Unsupervised Framework for User Identity Linkage. In The AAAI Conference on Artificial Intelligence. AAAI Press, 5714--5721.
[61]
Fan Zhou, Lei Liu, Kunpeng Zhang, Goce Trajcevski, Jin Wu, and Ting Zhong. 2018. Deeplink: A deep learning approach for user identity linkage. In IEEE INFOCOM. IEEE, 1313--1321.
[62]
Kai Zhou, Tomasz P. Michalak, Marcin Waniek, Talal Rahwan, and Yevgeniy Vorobeychik. 2019. Attacking Similarity-Based Link Prediction in Social Networks. In AAMAS. 305--313.
[63]
Yang Zhou, Zeru Zhang, Sixing Wu, Victor S. Sheng, Xiaoying Han, Zijie Zhang, and Ruoming Jin. 2021. Robust Network Alignment via Attack Signal Scaling and Adversarial Perturbation Elimination. In The ACM Web Conference. ACM / IW3C2, 3884--3895.
[64]
Lei Zou, Lei Chen, and M. Tamer Ö zsu. 2009. K-Automorphism: A General Framework For Privacy Preserving Network Publication. Proc. VLDB Endow., Vol. 2, 1 (2009), 946--957.
[65]
Daniel Zügner, Amir Akbarnejad, and Stephan Günnemann. 2018. Adversarial attacks on neural networks for graph data. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2847--2856.
[66]
Daniel Zügner and Stephan Günnemann. 2019. Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412 (2019).

Cited By

View all
  • (2024)Degrading the accuracy of interlayer link prediction: A method based on the analysis of node importanceInternational Journal of Modern Physics C10.1142/S012918312442004XOnline publication date: 21-Jun-2024

Index Terms

  1. TOAK: A Topology-oriented Attack Strategy for Degrading User Identity Linkage in Cross-network Learning

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management
      October 2023
      5508 pages
      ISBN:9798400701245
      DOI:10.1145/3583780
      This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 October 2023

      Check for updates

      Author Tags

      1. adversarial attack
      2. graph kernel
      3. social network
      4. user identity linkage

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CIKM '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)311
      • Downloads (Last 6 weeks)41
      Reflects downloads up to 04 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Degrading the accuracy of interlayer link prediction: A method based on the analysis of node importanceInternational Journal of Modern Physics C10.1142/S012918312442004XOnline publication date: 21-Jun-2024

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media