Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (11)

Search Parameters:
Keywords = user identity linkage

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 578 KB  
Article
Two-Stage Mining of Linkage Risk for Data Release
by Runshan Hu, Yuanguo Lin, Mu Yang, Yuanhui Yu and Vladimiro Sassone
Mathematics 2025, 13(17), 2731; https://doi.org/10.3390/math13172731 - 25 Aug 2025
Viewed by 247
Abstract
Privacy risk mining, a crucial domain in data privacy protection, endeavors to uncover potential information among datasets that could be linked to individuals’ sensitive data. Existing anonymization and privacy assessment techniques either lack quantitative granularity or fail to adapt to dynamic, heterogeneous data [...] Read more.
Privacy risk mining, a crucial domain in data privacy protection, endeavors to uncover potential information among datasets that could be linked to individuals’ sensitive data. Existing anonymization and privacy assessment techniques either lack quantitative granularity or fail to adapt to dynamic, heterogeneous data environments. In this work, we propose a unified two-phase linkability quantification framework that systematically measures privacy risks at both the inter-dataset and intra-dataset levels. Our approach integrates unsupervised clustering on attribute distributions with record-level matching to compute interpretable, fine-grained risk scores. By aligning risk measurement with regulatory standards such as the GDPR, our framework provides a practical, scalable solution for safeguarding user privacy in evolving data-sharing ecosystems. Extensive experiments on real-world and synthetic datasets show that our method achieves up to 96.7% precision in identifying true linkage risks, outperforming the compared baseline by 13 percentage points under identical experimental settings. Ablation studies further demonstrate that the hierarchical risk fusion strategy improves sensitivity to latent vulnerabilities, providing more actionable insights than previous privacy gain-based metrics. Full article
Show Figures

Figure 1

16 pages, 634 KB  
Article
Adap-UIL: A Multi-Feature-Aware User Identity Linkage Framework Based on an Adaptive Graph Walk
by Xiaqing Xie, Hangjiang Guo, Yueming Lu and Tianle Zhang
Appl. Sci. 2025, 15(12), 6762; https://doi.org/10.3390/app15126762 - 16 Jun 2025
Viewed by 360
Abstract
User Identity Linkage (UIL) has emerged as a focal point of research in the field of network analysis and plays a critical role in the governance of cyberspace; related technologies can also be extended for applications in traffic safety and traffic management. The [...] Read more.
User Identity Linkage (UIL) has emerged as a focal point of research in the field of network analysis and plays a critical role in the governance of cyberspace; related technologies can also be extended for applications in traffic safety and traffic management. The traditional random walk-based UIL method has achieved a balance between performance and interpretability, but it still faces several challenges, such as low discriminability of nodes, instability of feature extraction, and missing features in matching scenarios. To address these challenges, this paper presents Adap-UIL, a multi-feature UIL framework based on an Adaptive Graph Walk. First, we design and implement an Adaptive Graph Walk method based on the Restarted Affinity Coefficient (RAC), which enhances both the neighborhood and higher-order features of nodes, and then we integrate cross-network features to form Adap-UIL with a more enriched node representation, facilitating user identity linkage. Experimental results on real datasets show that the Adap-UIL model outperforms the benchmark models, especially in the P@5 and P@10 metrics by 5 percentage points, and it captures key features more efficiently and effectively. Full article
Show Figures

Figure 1

21 pages, 1560 KB  
Article
WMLinks: Wearable Smart Devices and Mobile Phones Linking through Bluetooth Low Energy (BLE) and WiFi Signals
by Naixuan Guo, Zhaofeng Chen, Heyang Xu, Yu Liu, Zhechun Zhao and Sen Xu
Electronics 2024, 13(16), 3268; https://doi.org/10.3390/electronics13163268 - 17 Aug 2024
Cited by 2 | Viewed by 1330
Abstract
Wearable smart devices have gradually become indispensable devices in people’s lives. Their security and privacy have gained increasing popularity among the public due to their ability to monitor and record various aspects of users’ daily activities and health data. These devices maintain a [...] Read more.
Wearable smart devices have gradually become indispensable devices in people’s lives. Their security and privacy have gained increasing popularity among the public due to their ability to monitor and record various aspects of users’ daily activities and health data. These devices maintain a wireless connection with mobile phones through periodic signal transmissions, which can be intercepted and analyzed by external observers. While these signal packets contain valuable information about the device owner, the identity of the actual user remains unknown. In this study, we propose two approaches to link wearable smart devices with users’ mobile phones, which serve as electronic identities, to enable novel applications such as multi-device authentication and user-device graph construction for targeted advertising. To establish this linkage, we propose two approaches: a passive-sniffing-based linking approach and an active-interference-based linking approach, which solve the problem of sniffing Bluetooth Low Energy broadcast packets in two stages of Bluetooth Low Energy communication. Through experiments conducted across three scenarios, we demonstrate that seven wearable devices can be successfully linked with an accuracy rate exceeding 80%, with accuracy rates approaching 100% when a device is recorded more than 11 times. Additionally, we find that four wearable devices can be linked via an active-interference-based linking approach with an accuracy rate exceeding 70%. Our results highlight the potential of wearable devices and mobile phones as a means of establishing user identities and enabling the development of more sophisticated applications in the field of wearable technology. Full article
(This article belongs to the Special Issue Wearable Device Design and Its Latest Applications)
Show Figures

Figure 1

27 pages, 512 KB  
Article
De-Anonymizing Users across Rating Datasets via Record Linkage and Quasi-Identifier Attacks
by Nicolás Torres and Patricio Olivares
Data 2024, 9(6), 75; https://doi.org/10.3390/data9060075 - 27 May 2024
Viewed by 2443
Abstract
The widespread availability of pseudonymized user datasets has enabled personalized recommendation systems. However, recent studies have shown that users can be de-anonymized by exploiting the uniqueness of their data patterns, raising significant privacy concerns. This paper presents a novel approach that tackles the [...] Read more.
The widespread availability of pseudonymized user datasets has enabled personalized recommendation systems. However, recent studies have shown that users can be de-anonymized by exploiting the uniqueness of their data patterns, raising significant privacy concerns. This paper presents a novel approach that tackles the challenging task of linking user identities across multiple rating datasets from diverse domains, such as movies, books, and music, by leveraging the consistency of users’ rating patterns as high-dimensional quasi-identifiers. The proposed method combines probabilistic record linkage techniques with quasi-identifier attacks, employing the Fellegi–Sunter model to compute the likelihood of two records referring to the same user based on the similarity of their rating vectors. Through extensive experiments on three publicly available rating datasets, we demonstrate the effectiveness of the proposed approach in achieving high precision and recall in cross-dataset de-anonymization tasks, outperforming existing techniques, with F1-scores ranging from 0.72 to 0.79 for pairwise de-anonymization tasks. The novelty of this research lies in the unique integration of record linkage techniques with quasi-identifier attacks, enabling the effective exploitation of the uniqueness of rating patterns as high-dimensional quasi-identifiers to link user identities across diverse datasets, addressing a limitation of existing methodologies. We thoroughly investigate the impact of various factors, including similarity metrics, dataset combinations, data sparsity, and user demographics, on the de-anonymization performance. This work highlights the potential privacy risks associated with the release of anonymized user data across diverse contexts and underscores the critical need for stronger anonymization techniques and tailored privacy-preserving mechanisms for rating datasets and recommender systems. Full article
(This article belongs to the Section Information Systems and Data Management)
Show Figures

Figure 1

21 pages, 2886 KB  
Article
A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT
by Taehoon Kim, Daehee Seo, Su-Hyun Kim and Im-Yeong Lee
Sensors 2024, 24(7), 2215; https://doi.org/10.3390/s24072215 - 29 Mar 2024
Cited by 1 | Viewed by 1650
Abstract
Decentralized Identifiers have recently expanded into Internet of Things devices and are crucial in securing users’ digital identities and data. However, Decentralized Identifiers face challenges in scenarios necessitating authority delegation and anonymity, such as when dealing with legal guardianship for minors, device loss [...] Read more.
Decentralized Identifiers have recently expanded into Internet of Things devices and are crucial in securing users’ digital identities and data. However, Decentralized Identifiers face challenges in scenarios necessitating authority delegation and anonymity, such as when dealing with legal guardianship for minors, device loss or damage, and specific medical contexts involving patient information. This paper aims to strengthen data sovereignty within the Decentralized Identifier system by implementing a secure authority delegation and anonymity scheme. It suggests optimizing verifiable presentations by utilizing a sequential aggregate signature, a Non-Interactive Zero-Knowledge Proof, and a Merkle tree to prevent against linkage and Sybil attacks while facilitating delegation. This strategy mitigates security risks related to delegation and anonymity, efficiently reduces the computational and verification efforts for signatures, and reduces the size of verifiable presentations by about 1.2 to 2 times. Full article
(This article belongs to the Special Issue Security, Cybercrime, and Digital Forensics for the IoT)
Show Figures

Figure 1

17 pages, 2156 KB  
Article
Novel Method of Edge-Removing Walk for Graph Representation in User Identity Linkage
by Xiaqing Xie, Wenyu Zang, Yanlin Hu, Jiangyu Ji and Zhihao Xiong
Electronics 2024, 13(4), 715; https://doi.org/10.3390/electronics13040715 - 9 Feb 2024
Cited by 1 | Viewed by 1367
Abstract
Random-walk-based graph representation methods have been widely applied in User Identity Linkage (UIL) tasks, which links overlapping users between two different social networks. It can help us to obtain more comprehensive portraits of criminals, which is helpful for improving cyberspace governance. Yet, random [...] Read more.
Random-walk-based graph representation methods have been widely applied in User Identity Linkage (UIL) tasks, which links overlapping users between two different social networks. It can help us to obtain more comprehensive portraits of criminals, which is helpful for improving cyberspace governance. Yet, random walk generates a large number of repeating sequences, causing unnecessary computation and storage overhead. This paper proposes a novel method called Edge-Removing Walk (ERW) that can replace random walk in random-walk-based models. It removes edges once they are walked in a walk round to capture the lhop features without repetition, and it walks the whole graph for several rounds to capture the different kinds of paths starting from a specific node. Experiments proved that ERW can exponentially improve the efficiency for random-walk-based UIL models, even maintaining better performance. We finally generalize ERW into a general User Identity Linkage framework called ERW-UIL and verify its performance. Full article
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems)
Show Figures

Figure 1

18 pages, 360 KB  
Article
The Culture of E-Arabs
by Abdulrahman Essa Al Lily, Abdelrahim Fathy Ismail, Fathi Mohammed Abunasser, Rafdan Hassan Alhajhoj Alqahtani, Firass Al-Lami and AlJohara Fahad Al Saud
J. Intell. 2023, 11(1), 7; https://doi.org/10.3390/jintelligence11010007 - 28 Dec 2022
Cited by 5 | Viewed by 3340
Abstract
This article scrutinises the linkage between ethnicity and people’s behaviour on Twitter. It examines how offline culture manifests itself online among Arabs. The article draws upon the literature to identify the offline ethnic characteristics of Arabs, and through interviews with and observations of [...] Read more.
This article scrutinises the linkage between ethnicity and people’s behaviour on Twitter. It examines how offline culture manifests itself online among Arabs. The article draws upon the literature to identify the offline ethnic characteristics of Arabs, and through interviews with and observations of Arab social media users, discovers their online ethnic characteristics. It then compares these online and offline characteristics and, through this comparison, finds that offline culture has been enacted online among Arabs, sustaining expressions of generosity, religiosity, traditionalism, female privacy, over-flattery, collectivism, tribalism, pan-Arabism, and social contracts; however, in other ways, offline culture has been counteracted online, which has led to the destabilisation of power relations between genders, elites and non-elites, and majorities and minorities. A further finding is that online culture has been enacted offline among Arabs in that online performance has exerted influence over offline ethnic identity expectations. In short, there are three main findings: offline culture has been enacted online, offline culture has been counteracted online, and online culture has been enacted offline. The take-home finding of this study is the existence of ‘e-ethnic culture’, that is, although ethnic activity online tends to be based on and reinforces offline realities and may alter offline realities as well, not all online performances have roots offline. Full article
(This article belongs to the Special Issue Social Intelligence in a Digital World)
22 pages, 1013 KB  
Article
User Identity Linkage across Social Networks with the Enhancement of Knowledge Graph and Time Decay Function
by Hao Gao, Yongqing Wang, Jiangli Shao, Huawei Shen and Xueqi Cheng
Entropy 2022, 24(11), 1603; https://doi.org/10.3390/e24111603 - 4 Nov 2022
Cited by 7 | Viewed by 2695
Abstract
Users participate in multiple social networks for different services. User identity linkage aims to predict whether users across different social networks refer to the same person, and it has received significant attention for downstream tasks such as recommendation and user profiling. Recently, researchers [...] Read more.
Users participate in multiple social networks for different services. User identity linkage aims to predict whether users across different social networks refer to the same person, and it has received significant attention for downstream tasks such as recommendation and user profiling. Recently, researchers proposed measuring the relevance of user-generated content to predict identity linkages of users. However, there are two challenging problems with existing content-based methods: first, barely considering the word similarities of texts is insufficient where the semantical correlations of named entities in the texts are ignored; second, most methods use time discretization technology, where the texts are divided into different time slices, resulting in failure of relevance modeling. To address these issues, we propose a user identity linkage model with the enhancement of a knowledge graph and continuous time decay functions that are designed for mitigating the influence of time discretization. Apart from modeling the correlations of the words, we extract the named entities in the texts and link them into the knowledge graph to capture the correlations of named entities. The semantics of texts are enhanced through the external knowledge of the named entities in the knowledge graph, and the similarity discrimination of the texts is also improved. Furthermore, we propose continuous time decay functions to capture the closeness of the posting time of texts instead of time discretization to avoid the matching error of texts. We conduct experiments on two real public datasets, and the experimental results show that the proposed method outperforms state-of-the-art methods. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

18 pages, 1571 KB  
Article
Network Alignment across Social Networks Using Multiple Embedding Techniques
by Van-Vang Le, Toai Kim Tran, Bich-Ngan T. Nguyen, Quoc-Dung Nguyen and Vaclav Snasel
Mathematics 2022, 10(21), 3972; https://doi.org/10.3390/math10213972 - 26 Oct 2022
Cited by 3 | Viewed by 3053
Abstract
Network alignment, which is also known as user identity linkage, is a kind of network analysis task that predicts overlapping users between two different social networks. This research direction has attracted much attention from the research community, and it is considered to be [...] Read more.
Network alignment, which is also known as user identity linkage, is a kind of network analysis task that predicts overlapping users between two different social networks. This research direction has attracted much attention from the research community, and it is considered to be one of the most important research directions in the field of social network analysis. There are many different models for finding users that overlap between two networks, but most of these models use separate and different techniques to solve prediction problems, with very little work that has combined them. In this paper, we propose a method that combines different embedding techniques to solve the network alignment problem. Each association network alignment technique has its advantages and disadvantages, so combining them together will take full advantage and can overcome those disadvantages. Our model combines three-level embedding techniques of text-based user attributes, a graph attention network, a graph-drawing embedding technique, and fuzzy c-mean clustering to embed each piece of network information into a low-dimensional representation. We then project them into a common space by using canonical correlation analysis and compute the similarity matrix between them to make predictions. We tested our network alignment model on two real-life datasets, and the experimental results showed that our method can considerably improve the accuracy by about 10–15% compared to the baseline models. In addition, when experimenting with different ratios of training data, our proposed model could also handle the over-fitting problem effectively. Full article
(This article belongs to the Special Issue Complex Network Modeling: Theory and Applications)
Show Figures

Figure 1

16 pages, 862 KB  
Article
User Identity Linkage Across Social Networks by Heterogeneous Graph Attention Network Modeling
by Ruiheng Wang, Hongliang Zhu, Lu Wang, Zhaoyun Chen, Mingcheng Gao and Yang Xin
Appl. Sci. 2020, 10(16), 5478; https://doi.org/10.3390/app10165478 - 7 Aug 2020
Cited by 9 | Viewed by 3910
Abstract
Today, social networks are becoming increasingly popular and indispensable, where users usually have multiple accounts. It is of considerable significance to conduct user identity linkage across social networks. We can comprehensively depict diversified characteristics of user behaviors, accurately model user profiles, conduct recommendations [...] Read more.
Today, social networks are becoming increasingly popular and indispensable, where users usually have multiple accounts. It is of considerable significance to conduct user identity linkage across social networks. We can comprehensively depict diversified characteristics of user behaviors, accurately model user profiles, conduct recommendations across social networks, and track cross social network user behaviors by user identity linkage. Existing works mainly focus on a specific type of user profile, user-generated content, and structural information. They have problems of weak data expression ability and ignored potential relationships, resulting in unsatisfactory performances of user identity linkage. Recently, graph neural networks have achieved excellent results in graph embedding, graph representation, and graph classification. As a graph has strong relationship expression ability, we propose a user identity linkage method based on a heterogeneous graph attention network mechanism (UIL-HGAN). Firstly, we represent user profiles, user-generated content, structural information, and their features in a heterogeneous graph. Secondly, we use multiple attention layers to aggregate user information. Finally, we use a multi-layer perceptron to predict user identity linkage. We conduct experiments on two real-world datasets: OSCHINA-Gitee and Facebook-Twitter. The results validate the effectiveness and advancement of UIL-HGAN by comparing different feature combinations and methods. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

19 pages, 1836 KB  
Article
A Privacy Measurement Framework for Multiple Online Social Networks against Social Identity Linkage
by Xuefeng Li, Yixian Yang, Yuling Chen and Xinxin Niu
Appl. Sci. 2018, 8(10), 1790; https://doi.org/10.3390/app8101790 - 1 Oct 2018
Cited by 18 | Viewed by 3751
Abstract
Recently, the number of people who are members of multiple online social networks simultaneously has increased. However, if these people share everything with others, they risk their privacy. Users may be unaware of the privacy risks involved with sharing their sensitive information on [...] Read more.
Recently, the number of people who are members of multiple online social networks simultaneously has increased. However, if these people share everything with others, they risk their privacy. Users may be unaware of the privacy risks involved with sharing their sensitive information on a network. Currently, there are many research efforts focused on social identity linkage (SIL) on multiple online social networks for commercial services, which exacerbates privacy issues. Many existing studies consider methods of encrypting or deleting sensitive information without considering if this is unreasonable for social networks. Meanwhile, these studies ignore privacy awareness, which is rudimentary and critical. To enhance privacy awareness, we discuss a user privacy exposure measure for users who are members of multiple online social networks. With this measure, users can be aware of the state of their privacy and their position on a privacy measurement scale. Additionally, we propose a straightforward method through our framework to reduce information loss and foster user privacy awareness by using spurious content for required fields. Full article
(This article belongs to the Special Issue Security and Privacy for Cyber Physical Systems)
Show Figures

Figure 1

Back to TopTop