{"id":"https://openalex.org/W4319068692","doi":"https://doi.org/10.1109/tdsc.2023.3242009","title":"Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks","display_name":"Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks","publication_year":2023,"publication_date":"2023-02-03","ids":{"openalex":"https://openalex.org/W4319068692","doi":"https://doi.org/10.1109/tdsc.2023.3242009"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3242009","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3242009","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047386042","display_name":"Huanran Wang","orcid":"https://orcid.org/0000-0002-5782-177X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huanran Wang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China","Modeling and Emulation in E-Government National Engineering Laboratory, Harbin, Heilongjiang, China"],"raw_orcid":"https://orcid.org/0000-0002-5782-177X","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"Modeling and Emulation in E-Government National Engineering Laboratory, Harbin, Heilongjiang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067423683","display_name":"Wu Yang","orcid":"https://orcid.org/0000-0001-5985-7648"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Yang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China"],"raw_orcid":"https://orcid.org/0000-0001-5985-7648","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067145421","display_name":"Dapeng Man","orcid":"https://orcid.org/0000-0003-1177-3693"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dapeng Man","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China"],"raw_orcid":"https://orcid.org/0000-0003-1177-3693","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392143","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-9768-3121"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059685245","display_name":"Jiguang Lv","orcid":"https://orcid.org/0000-0001-5502-7217"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguang Lv","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China"],"raw_orcid":"https://orcid.org/0000-0001-5502-7217","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, Heilongjiang, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047386042"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":1.5337,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8551528,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"20","issue":"6","first_page":"5197","last_page":"5213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9309999942779541,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.738814115524292},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7017661333084106},{"id":"https://openalex.org/keywords/graph-embedding","display_name":"Graph embedding","score":0.6120558381080627},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.54509037733078},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5368810892105103},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5295803546905518},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.47549355030059814},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.45384472608566284},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45318976044654846},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39200150966644287},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36520659923553467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.738814115524292},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7017661333084106},{"id":"https://openalex.org/C75564084","wikidata":"https://www.wikidata.org/wiki/Q5597085","display_name":"Graph embedding","level":3,"score":0.6120558381080627},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.54509037733078},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5368810892105103},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5295803546905518},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.47549355030059814},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.45384472608566284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45318976044654846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39200150966644287},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36520659923553467},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3242009","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3242009","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G1161215003","display_name":null,"funder_award_id":"61831007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1888005072","https://openalex.org/W1980680715","https://openalex.org/W2014374374","https://openalex.org/W2016563917","https://openalex.org/W2022580894","https://openalex.org/W2047532797","https://openalex.org/W2057685268","https://openalex.org/W2060616833","https://openalex.org/W2066459332","https://openalex.org/W2075633077","https://openalex.org/W2077738931","https://openalex.org/W2090891622","https://openalex.org/W2127048411","https://openalex.org/W2154851992","https://openalex.org/W2165424625","https://openalex.org/W2387462954","https://openalex.org/W2393319904","https://openalex.org/W2585291516","https://openalex.org/W2607683755","https://openalex.org/W2612872092","https://openalex.org/W2755121186","https://openalex.org/W2758068229","https://openalex.org/W2763243434","https://openalex.org/W2777398797","https://openalex.org/W2793022729","https://openalex.org/W2800544704","https://openalex.org/W2803312888","https://openalex.org/W2888657195","https://openalex.org/W2904205492","https://openalex.org/W2914547623","https://openalex.org/W2920698537","https://openalex.org/W2962756421","https://openalex.org/W2964015378","https://openalex.org/W2965148591","https://openalex.org/W3011480995","https://openalex.org/W3026182744","https://openalex.org/W3030424116","https://openalex.org/W3047891698","https://openalex.org/W3080406377","https://openalex.org/W3093331990","https://openalex.org/W3102641634","https://openalex.org/W3104097132","https://openalex.org/W3123459983","https://openalex.org/W3173377676","https://openalex.org/W6622955728","https://openalex.org/W6678885109","https://openalex.org/W6716303938","https://openalex.org/W6726873649","https://openalex.org/W6728757088","https://openalex.org/W6731581786","https://openalex.org/W6731785350","https://openalex.org/W6759226220","https://openalex.org/W6797178670"],"related_works":["https://openalex.org/W3134175397","https://openalex.org/W3036264823","https://openalex.org/W2123605750","https://openalex.org/W2912814903","https://openalex.org/W2088740331","https://openalex.org/W3206528106","https://openalex.org/W2950907416","https://openalex.org/W3038102983","https://openalex.org/W2082479932","https://openalex.org/W2932872266"],"abstract_inverted_index":{"Anchor":[0],"link":[1,20],"prediction":[2,21],"exacerbates":[3],"the":[4,10,25,29,38,46,61,70,86,94,97,101,124,128,150,159,165,179,184],"risk":[5],"of":[6,12,28,48,63,78,90,146,152,167,189],"privacy":[7],"leakage":[8],"via":[9],"de-anonymization":[11],"social":[13,116,142,169,175],"network":[14,87,117],"data.":[15],"Embedding-based":[16],"methods":[17,186],"for":[18],"anchor":[19,130],"are":[22],"limited":[23],"by":[24,45,164],"excessive":[26],"similarity":[27],"associated":[30,98],"nodes":[31,91,99],"in":[32,69,100,187],"a":[33,56,105],"latent":[34,41,71,160],"feature":[35,42,72,161],"space":[36],"and":[37,92,118,149,192],"variation":[39],"between":[40,66,96,158],"spaces":[43,162],"caused":[44,163],"semantics":[47,166],"different":[49,67,141,168],"networks.":[50,143,170],"In":[51],"this":[52],"article,":[53],"we":[54],"propose":[55],"novel":[57],"method":[58,76,181],"which":[59,110],"reduces":[60],"impact":[62],"semantic":[64],"discrepancies":[65],"networks":[68,176],"space.":[73,103],"The":[74,144],"proposed":[75,180],"consists":[77],"two":[79],"phases.":[80],"First,":[81],"graph":[82,112,137,153],"embedding":[83,102,113,138,154],"focuses":[84],"on":[85,114,123,140,173],"structural":[88],"roles":[89],"increases":[93],"distinction":[95,147],"Second,":[104],"federated":[106],"adversarial":[107,120],"learning":[108,121],"framework":[109],"performs":[111],"each":[115],"an":[119],"model":[122],"server":[125],"according":[126],"to":[127,134],"observable":[129],"links":[131],"is":[132],"used":[133],"associate":[135],"independent":[136],"approaches":[139,155],"combination":[145],"enhancement":[148],"association":[151],"alleviates":[156],"variance":[157],"Extensive":[171],"experiments":[172],"real":[174],"demonstrate":[177],"that":[178],"significantly":[182],"outperforms":[183],"state-of-the-art":[185],"terms":[188],"both":[190],"precision":[191],"robustness.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
