{"id":"https://openalex.org/W4226109103","doi":"https://doi.org/10.1145/3498851.3499024","title":"A Subgraph Isomorphism-based Attack Towards Social Networks","display_name":"A Subgraph Isomorphism-based Attack Towards Social Networks","publication_year":2021,"publication_date":"2021-12-14","ids":{"openalex":"https://openalex.org/W4226109103","doi":"https://doi.org/10.1145/3498851.3499024"},"language":"en","primary_location":{"id":"doi:10.1145/3498851.3499024","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3498851.3499024","pdf_url":null,"source":{"id":"https://openalex.org/S4363608074","display_name":"IEEE/WIC/ACM International Conference on Web Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/WIC/ACM International Conference on Web Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001090944","display_name":"Mengjiao Guo","orcid":"https://orcid.org/0000-0001-7029-5797"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mengjiao Guo","raw_affiliation_strings":["Swinburne University of Technology, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058644115","display_name":"Chi\u2010Hung Chi","orcid":"https://orcid.org/0000-0001-7271-1926"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chi-Hung Chi","raw_affiliation_strings":["Software and Computational Systems Program, Data 61, CSIRO, Australia"],"affiliations":[{"raw_affiliation_string":"Software and Computational Systems Program, Data 61, CSIRO, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430503","display_name":"Hui Zheng","orcid":"https://orcid.org/0000-0001-9317-1762"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hui Zheng","raw_affiliation_strings":["Swinburne University of Technology, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081879366","display_name":"Jing He","orcid":"https://orcid.org/0000-0001-6488-1052"},"institutions":[{"id":"https://openalex.org/I137056471","display_name":"Nanjing University of Finance and Economics","ror":"https://ror.org/031y8am81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137056471"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing He","raw_affiliation_strings":["Nanjing University of Finance and Economics, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Finance and Economics, China","institution_ids":["https://openalex.org/I137056471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100400107","display_name":"Xiaoting Zhang","orcid":"https://orcid.org/0000-0002-5336-1956"},"institutions":[{"id":"https://openalex.org/I137056471","display_name":"Nanjing University of Finance and Economics","ror":"https://ror.org/031y8am81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137056471"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoting Zhang","raw_affiliation_strings":["Nanjing University of Finance and Economics, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Finance and Economics, China","institution_ids":["https://openalex.org/I137056471"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001090944"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.22753456,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"520","last_page":"528"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12292","display_name":"Graph Theory and Algorithms","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12292","display_name":"Graph Theory and Algorithms","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/subgraph-isomorphism-problem","display_name":"Subgraph isomorphism problem","score":0.8213264346122742},{"id":"https://openalex.org/keywords/induced-subgraph-isomorphism-problem","display_name":"Induced subgraph isomorphism problem","score":0.655538022518158},{"id":"https://openalex.org/keywords/isomorphism","display_name":"Isomorphism (crystallography)","score":0.6482560634613037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5869113206863403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3483729660511017},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2800080478191376},{"id":"https://openalex.org/keywords/crystallography","display_name":"Crystallography","score":0.08208799362182617},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.054496556520462036}],"concepts":[{"id":"https://openalex.org/C131992880","wikidata":"https://www.wikidata.org/wiki/Q2528185","display_name":"Subgraph isomorphism problem","level":3,"score":0.8213264346122742},{"id":"https://openalex.org/C191241153","wikidata":"https://www.wikidata.org/wiki/Q6027240","display_name":"Induced subgraph isomorphism problem","level":5,"score":0.655538022518158},{"id":"https://openalex.org/C203436722","wikidata":"https://www.wikidata.org/wiki/Q902950","display_name":"Isomorphism (crystallography)","level":3,"score":0.6482560634613037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5869113206863403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3483729660511017},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2800080478191376},{"id":"https://openalex.org/C8010536","wikidata":"https://www.wikidata.org/wiki/Q160398","display_name":"Crystallography","level":1,"score":0.08208799362182617},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.054496556520462036},{"id":"https://openalex.org/C22149727","wikidata":"https://www.wikidata.org/wiki/Q7940747","display_name":"Voltage graph","level":4,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C203776342","wikidata":"https://www.wikidata.org/wiki/Q1378376","display_name":"Line graph","level":3,"score":0.0},{"id":"https://openalex.org/C115624301","wikidata":"https://www.wikidata.org/wiki/Q895901","display_name":"Crystal structure","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3498851.3499024","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3498851.3499024","pdf_url":null,"source":{"id":"https://openalex.org/S4363608074","display_name":"IEEE/WIC/ACM International Conference on Web Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/WIC/ACM International Conference on Web Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W22424597","https://openalex.org/W772516776","https://openalex.org/W839407891","https://openalex.org/W1969269637","https://openalex.org/W1982870104","https://openalex.org/W2016057533","https://openalex.org/W2033281525","https://openalex.org/W2084652036","https://openalex.org/W2096296626","https://openalex.org/W2124849257","https://openalex.org/W2126359798","https://openalex.org/W2140840007","https://openalex.org/W2143363350","https://openalex.org/W2329465571","https://openalex.org/W2525488343","https://openalex.org/W2615384791","https://openalex.org/W2795196889","https://openalex.org/W2903174694","https://openalex.org/W2908442265","https://openalex.org/W2968917987","https://openalex.org/W3082514488","https://openalex.org/W3133114748","https://openalex.org/W4244851570","https://openalex.org/W4299516513","https://openalex.org/W6629884921","https://openalex.org/W6652304580","https://openalex.org/W6683659113","https://openalex.org/W6764588805"],"related_works":["https://openalex.org/W2532922352","https://openalex.org/W231720905","https://openalex.org/W2604893261","https://openalex.org/W2915540008","https://openalex.org/W1482551403","https://openalex.org/W2361654510","https://openalex.org/W2905073546","https://openalex.org/W2183579781","https://openalex.org/W3080158623","https://openalex.org/W2494517118"],"abstract_inverted_index":{"It":[0],"has":[1],"been":[2],"widely":[3],"recognized":[4],"that":[5],"social":[6,19,71,136],"network":[7],"analysis":[8],"of":[9,70,74,91,175,201,217,227,241,247],"group":[10],"relationships":[11],"and":[12,31,64,140,153,188,204,219,243,250,268],"behaviors":[13],"come":[14],"to":[15,46,57,112,124,129,236,262],"thrive,":[16],"so":[17],"publicity":[18],"networks":[20],"have":[21],"gained":[22],"growing":[23],"attention":[24],"from":[25,38],"third-party":[26],"individuals":[27],"for":[28,164,186],"academic":[29],"researchers":[30],"advertisers.":[32],"Anonymous":[33],"versions":[34],"are":[35,122],"generally":[36,66],"obtained":[37],"the":[39,75,89,92,113,119,125,135,173,206,214,225,233,238,258,265,272,282],"naive":[40],"anonymization":[41],"mechanism":[42],"through":[43],"identity":[44],"transformation":[45],"fend":[47],"off":[48],"attacks":[49],"on":[50,172,278],"socially":[51],"sensitive":[52],"information.":[53,96,116],"The":[54],"adversaries":[55],"intend":[56],"implement":[58],"person":[59],"re-identification":[60],"in":[61,134],"anonymous":[62],"data,":[63],"they":[65],"possess":[67],"a":[68,81,160,165,183,193,199],"subset":[69],"interaction":[72],"information":[73,101,107],"target":[76,152],"user.":[77],"In":[78,167],"this":[79,168],"way,":[80],"privacy":[82],"breach":[83],"could":[84],"be":[85,109],"achieved":[86],"by":[87],"exploiting":[88],"neighbourhood":[90],"object's":[93],"known":[94],"structural":[95,115,176,190],"Say,":[97],"if":[98,264],"one":[99],"node's":[100],"is":[102,132,159],"breached,":[103],"other":[104],"nodes\u2019":[105],"private":[106],"will":[108],"compromised":[110],"according":[111],"detected":[114],"Therefore,":[117,156],"all":[118],"mentioned":[120],"above":[121],"equivalent":[123],"subgraph":[126,142,157,174,179],"isomorphism":[127,143],"problem":[128,162],"identify":[130],"who":[131,133],"networks.":[137],"Existing":[138],"enumeration":[139],"indexing-related":[141],"methods":[144],"cannot":[145],"process":[146],"matching":[147],"problems":[148],"with":[149,209],"both":[150],"large":[151,194],"query":[154,207,248,266],"graphs.":[155,229],"querying":[158],"knotty":[161],"pressing":[163],"solution.":[166],"work,":[169],"we":[170,197,231],"elaborate":[171],"attack.":[177],"Our":[178],"isomorphism-based":[180],"method":[181],"adopts":[182],"3-stage":[184],"framework":[185],"learning":[187],"refining":[189],"correspondences":[191],"over":[192,213],"graph.":[195,252],"First,":[196],"generate":[198],"set":[200],"candidate":[202,211,228,251,269],"matches":[203],"compare":[205],"graph":[208,249,267,270],"these":[210],"graphs":[212],"corresponding":[215],"number":[216,226],"vertex":[218,242],"edge,":[220],"which":[221],"can":[222],"noticeably":[223],"reduce":[224],"Secondly,":[230],"employ":[232],"permutation":[234],"theorem":[235,261],"evaluate":[237],"row":[239],"sum":[240],"edge":[244],"adjacency":[245],"matrix":[246],"Lastly,":[253],"our":[254],"proposed":[255,283],"scheme":[256],"deploys":[257],"well-found":[259],"equinumerosity":[260],"verify":[263,281],"satisfy":[271],"isomorphic":[273],"relationship.":[274],"Solid":[275],"evaluation":[276],"criteria":[277],"time":[279],"complexity":[280],"attack":[284],"strategy.":[285]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
