User Identity Linkage on Social Networks: A Review of Modern Techniques and Applications

被引:0
作者
Senette, Caterina [1 ]
Siino, Marco [2 ]
Tesconi, Maurizio [1 ]
机构
[1] IIT CNR, Natl Res Council Italy, Inst Informat & Telemat, I-56124 Pisa, Italy
[2] Univ Catania, Dipartimento Ingn Elettr Elettron & Informat, I-95124 Catania, Italy
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Social networking (online); Couplings; Reviews; Feature extraction; Privacy; Surveys; Predictive models; Pragmatics; Machine learning; Data models; User identity linkage; social networks; network alignment; review; IDENTIFICATION;
D O I
10.1109/ACCESS.2024.3500374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an Online Social Network (OSN), users can create a unique public persona by crafting a user identity that may encompass profile details, content, and network-related information. As a result, a relevant task of interest is related to the ability to link identities across different OSNs that can have multiple implications in several contexts both at the individual level (e.g., better knowledge of users) and at the group level (e.g., predicting network dynamics, information diffusion, etc.). The purpose of this work is to provide a comprehensive review of recent studies (from 2016 to the present) on User Identity Linkage (UIL) methods across online social networks. It would offer guidance for other researchers in the field by outlining the main problem formulations, the different feature extraction strategies, algorithms, machine learning models, datasets, and evaluation metrics proposed by researchers working in this area. To this aim, the proposed overview takes a pragmatic perspective to highlight the concrete possibilities for accomplishing this task depending on the type of available data. Our analysis demonstrates significant progress in addressing the UIL task, largely due to the development of more advanced deep-learning architectures. Nevertheless, certain challenges persist, primarily stemming from the limited availability of benchmark datasets. This limitation is further compounded by current social network access policies, which prioritize privacy protection and reduce opportunities to retrieve data through APIs.
引用
收藏
页码:171241 / 171268
页数:28
相关论文
共 110 条
[31]  
Kaushal R., 2020, P INT C NETW SCI, P61
[32]  
Kaushal R., 2020, Doctoral dissertation
[33]   Inferring Anchor Links across Multiple Heterogeneous Social Networks [J].
Kong, Xiangnan ;
Zhang, Jiawei ;
Yu, Philip S. .
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, :179-188
[34]   An efficient reconciliation algorithm for social networks [J].
Korula, Nitish ;
Lattanzi, Silvio .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (05) :377-388
[35]  
Leskovec J, 2014, SNAP DATASETS STANFO
[36]  
Li CZ, 2019, AAAI CONF ARTIF INTE, P996
[37]   User Identity Linkage with Accumulated Information from Neighbouring Anchor Links [J].
Li, Xiang ;
Su, Yijun ;
Tang, Wei ;
Gao, Neng ;
Xiang, Ji .
WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT II, 2018, 11234 :335-344
[38]   An emergency exits choice preference model based on characteristics of individual diversity [J].
Li, Zhihong .
ADVANCES IN MECHANICAL ENGINEERING, 2017, 9 (04) :1-23
[39]   MLTracer: Malicious Logins Detection System via Graph Neural Network [J].
Liu, Fucheng ;
Wen, Yu ;
Wu, Yanna ;
Liang, Shuangshuang ;
Jiang, Xihe ;
Meng, Dan .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :715-726
[40]  
Liu JC, 2022, PROCEEDINGS OF DEEP LEARNING INSIDE OUT (DEELIO 2022): THE 3RD WORKSHOP ON KNOWLEDGE EXTRACTION AND INTEGRATION FOR DEEP LEARNING ARCHITECTURES, P100