{"id":"https://openalex.org/W3006975625","doi":"https://doi.org/10.1109/bigdata47090.2019.9005684","title":"Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction","display_name":"Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3006975625","doi":"https://doi.org/10.1109/bigdata47090.2019.9005684","mag":"3006975625"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata47090.2019.9005684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9005684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014861105","display_name":"Zhongyuan Jiang","orcid":"https://orcid.org/0000-0001-8249-9711"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhongyuan Jiang","raw_affiliation_strings":["Xidian University, Xi\u2019an, Shaanxi, USA","Xidian University, Xi'an, Shaanxi, USA"],"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, Shaanxi, USA","institution_ids":[]},{"raw_affiliation_string":"Xidian University, Xi'an, Shaanxi, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100600306","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-0846-964X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["Xidian University, Xi\u2019an, Shaanxi, USA","Xidian University, Xi'an, Shaanxi, USA"],"affiliations":[{"raw_affiliation_string":"Xidian University, Xi\u2019an, Shaanxi, USA","institution_ids":[]},{"raw_affiliation_string":"Xidian University, Xi'an, Shaanxi, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036357902","display_name":"Philip S. Yu","orcid":"https://orcid.org/0000-0002-3491-5968"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Philip S. Yu","raw_affiliation_strings":["University of Illinois at Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Chicago, IL, USA","institution_ids":["https://openalex.org/I39422238"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014861105"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2896,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.56855737,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1381","last_page":"1388"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.8073866367340088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7862011790275574},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.648396372795105},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5053356289863586},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.45882678031921387},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.44737282395362854},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.43392595648765564},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41519150137901306},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.351550817489624},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.230150043964386},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21251806616783142},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21134477853775024},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19889631867408752}],"concepts":[{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.8073866367340088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7862011790275574},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.648396372795105},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5053356289863586},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.45882678031921387},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.44737282395362854},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.43392595648765564},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41519150137901306},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.351550817489624},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.230150043964386},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21251806616783142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21134477853775024},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19889631867408752},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata47090.2019.9005684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata47090.2019.9005684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W20667085","https://openalex.org/W201336350","https://openalex.org/W1498410333","https://openalex.org/W1527463082","https://openalex.org/W1544573083","https://openalex.org/W1556758605","https://openalex.org/W1822655612","https://openalex.org/W2007444087","https://openalex.org/W2026417691","https://openalex.org/W2031310794","https://openalex.org/W2040956707","https://openalex.org/W2042654743","https://openalex.org/W2063742835","https://openalex.org/W2065228400","https://openalex.org/W2066636486","https://openalex.org/W2087742979","https://openalex.org/W2100256240","https://openalex.org/W2136647665","https://openalex.org/W2151936673","https://openalex.org/W2157054705","https://openalex.org/W2161984370","https://openalex.org/W2162808198","https://openalex.org/W2766587611","https://openalex.org/W2963395938","https://openalex.org/W3006663570","https://openalex.org/W3121379941","https://openalex.org/W6638475069","https://openalex.org/W6679290131"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2502115930"],"abstract_inverted_index":{"The":[0],"disclosure":[1],"of":[2,16,37,52,69,126,161,168],"an":[3],"important":[4],"yet":[5],"sensitive":[6,23],"link":[7,24,30,45,63,93,98],"may":[8],"cause":[9],"serious":[10],"privacy":[11,99,188],"crisis":[12],"between":[13,123,164],"two":[14,166],"users":[15],"a":[17,28,65,80,113,141,208],"social":[18,136],"graph.":[19],"Only":[20],"deleting":[21],"the":[22,34,43,50,53,85,91,103,159,165,176,181,197,203,216],"referred":[25,100],"to":[26,58,95,101,157,194],"as":[27,84,102],"target":[29,36,55,97,171],"which":[31,105,149],"is":[32,39,131,213],"often":[33],"attacked":[35],"adversaries":[38],"not":[40],"enough,":[41],"because":[42],"adversarial":[44,62],"prediction":[46],"can":[47,111,150,200],"deeply":[48],"forecast":[49],"existence":[51],"missing":[54,170],"link.":[56],"Thus,":[57],"defend":[59],"some":[60],"specific":[61],"prediction,":[64],"budget":[66],"limited":[67,121],"number":[68],"other":[70],"non-target":[71,183],"links":[72,184],"should":[73],"be":[74],"optimally":[75],"removed.":[76],"We":[77],"first":[78],"propose":[79,140],"path-based":[81],"dissimilarity":[82],"function":[83],"optimizing":[86],"objective":[87],"and":[88,108,173,206],"prove":[89],"that":[90,144,196,212],"greedy":[92],"deletion":[94],"preserve":[96],"GLD2Privacy":[104,129],"has":[106],"monotonicity":[107],"submodularity":[109],"properties":[110],"achieve":[112,207],"near":[114,210],"optimal":[115],"solution.":[116],"However,":[117],"emulating":[118],"all":[119],"length":[120],"paths":[122,160,178],"any":[124,169],"pair":[125],"nodes":[127],"for":[128,187],"mechanism":[130,143],"impossible":[132],"in":[133,153],"large":[134,154],"scale":[135,155],"graphs.":[137],"Secondly,":[138],"we":[139,179,191],"Walk2Privacy":[142,198],"uses":[145],"self-avoiding":[146],"random":[147],"walk":[148],"efficiently":[151],"run":[152],"graphs":[156],"sample":[158],"given":[162],"lengths":[163],"ends":[167],"link,":[172],"based":[174],"on":[175],"sampled":[177],"select":[180],"alternative":[182],"being":[185],"deleted":[186],"purpose.":[189],"Finally,":[190],"compose":[192],"experiments":[193],"demonstrate":[195],"algorithm":[199],"remarkably":[201],"reduce":[202],"time":[204],"consumption":[205],"very":[209],"solution":[211],"achieved":[214],"by":[215],"GLD2Privacy.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
