Abstract:Message forwarding is widely used in social network information systems. However, private information can be leaked without authorization from the information publisher. Privacy information leakage nodes need to be identified to eliminate such security risks. An estimator based distributed learning automata for trust inference (EDLATrust) is developed in this study to infer the trust level between non-directly connected nodes by reducing the number of convergence steps. The EDLATrust algorithm is combined with the XGBoost algorithm to identify privacy leakage in social network by using linear and group information transmission propagation models with three information dissemination characteristics. The algorithm predicts potential links in the information transmission chain and assists predicting information leakage points to improve the information dissemination security in social networks. Tests show that the model can effectively predict information leakage points in the information transmission chain for three real social network data sets to protect user privacy.
朱唯一, 张雪芹, 顾春华. 基于EDLATrust算法的社交网络信息泄露节点概率预测[J]. 清华大学学报(自然科学版), 2022, 62(2): 355-366.
ZHU Weiyi, ZHANG Xueqin, GU Chunhua. Social network information leakage node probability prediction based on the EDLATrust algorithm. Journal of Tsinghua University(Science and Technology), 2022, 62(2): 355-366.
[1] KIM Y A. An enhanced trust propagation approach with expertise and homophily-based trust networks[J]. Knowledge-Based Systems, 2015, 82:20-28. [2] KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks[J]. Knowledge-Based Systems, 2011, 24(8):1360-1371. [3] SHEKARPOUR S, KATEBI S D. Modeling and evaluation of trust with an extension in semantic web[J]. Journal of Web Semantics, 2010, 8(1):26-36. [4] FERNÁNDEZ E. Learning automata-based CPU non-intensive calculation of dedicated and shared protected paths in bandwidth-guaranteed networks[J]. Computer Communications, 2017, 103:130-140. [5] MORADABADI B, MEYBODI M R. Link prediction in weighted social networks using learning automata[J]. Engineering Applications of Artificial Intelligence, 2018, 70:16-24. [6] GHAVIPOUR M, MEYBODI M R. Trust propagation algorithm based on learning automata for inferring local trust in online social networks[J]. Knowledge-Based Systems, 2018, 143:307-316. [7] DAUD N N, HAMID S H A, SAADOON M, et al. Applications of link prediction in social networks:A review[J]. Journal of Network and Computer Applications, 2020, 166:102716. [8] LIBEN-NOWELL D, KLEINBERG J. The link-prediction problem for social networks[J]. Journal of the American Society for Information Science and Technology, 2007, 58(7):1019-1031. [9] LIU Y Y, ZHAO C L, WANG X J, et al. The degree-related clustering coefficient and its application to link prediction[J]. Physica A:Statistical Mechanics and Its Applications, 2016, 454:24-33. [10] MUNIZ C P, GOLDSCHMIDT R, CHOREN R. Combining contextual, temporal and topological information for unsupervised link prediction in social networks[J]. Knowledge-Based Systems, 2018, 156:129-137. [11] FU C B, ZHAO M H, FAN L, et al. Link weight prediction using supervised learning methods and its application to yelp layered network[J]. IEEE Transactions on Knowledge & Data Engineering, 2018, 30(8):1507-1518. [12] CHEN T, GUESTRIN C. XGBoost:A scalable tree boosting system[C]//The 22nd ACM SIGKDD International Conference. New York, USA, 2016:785-794. [13] UREN~A R, KOU G, DONG Y C, et al. A review on trust propagation and opinion dynamics in social networks and group decision making frameworks[J]. Information Sciences, 2019, 478:461-475. [14] REZVANIAN A, RAHMATI M, MEYBODI M R. Sampling from complex networks using distributed learning automata[J]. Physica A:Statistical Mechanics and Its Applications, 2014, 396:224-234. [15] GE H, JIANG W, LI S H, et al. A novel estimator based learning automata algorithm[J]. Applied Intelligence, 2015, 42(2):262-275. [16] BASTAMI E, MAHABADI A, TAGHIZADEH E. A gravitation-based link prediction approach in social networks[J]. Swarm and Evolutionary Computation, 2019, 44:176-186. [17] KIANINEJAD M, KABIRI P. A strategy for trust propagation along the more trusted paths[C]//20183rd Conference on Swarm Intelligence and Evolutionary Computation. Bam, Iran, 2018:1-6. [18] JIANG W J, WU J, LI F, et al. Trust evaluation in online social networks using generalized network flow[J]. IEEE Transactions on Computers, 2016, 65(3):952-963.