NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive
User Profile Data
- URL: http://arxiv.org/abs/2109.15179v1
- Date: Thu, 30 Sep 2021 14:49:07 GMT
- Title: NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive
User Profile Data
- Authors: Ahmed Alharbi, Hai Dong, Xun Yi and Prabath Abeysekara
- Abstract summary: Social sensing is a paradigm that allows crowdsourcing data from humans and devices.
Attackers intrude social-sensor clouds by cloning SocSen service providers' user profiles.
We propose a novel unsupervised SocSen service provider identity cloning detection approach, NPS-AntiClone.
- Score: 7.257277734039782
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Social sensing is a paradigm that allows crowdsourcing data from humans and
devices. This sensed data (e.g. social network posts) can be hosted in
social-sensor clouds (i.e. social networks) and delivered as social-sensor
cloud services (SocSen services). These services can be identified by their
providers' social network accounts. Attackers intrude social-sensor clouds by
cloning SocSen service providers' user profiles to deceive social-sensor cloud
users. We propose a novel unsupervised SocSen service provider identity cloning
detection approach, NPS-AntiClone, to prevent the detrimental outcomes caused
by such identity deception. This approach leverages non-privacy-sensitive user
profile data gathered from social networks to perform cloned identity
detection. It consists of three main components: 1) a multi-view account
representation model, 2) an embedding learning model and 3) a prediction model.
The multi-view account representation model forms three different views for a
given identity, namely a post view, a network view and a profile attribute
view. The embedding learning model learns a single embedding from the generated
multi-view representation using Weighted Generalized Canonical Correlation
Analysis. Finally, NPS-AntiClone calculates the cosine similarity between two
accounts' embedding to predict whether these two accounts contain a cloned
account and its victim. We evaluated our proposed approach using a real-world
dataset. The results showed that NPS-AntiClone significantly outperforms the
existing state-of-the-art identity cloning detection techniques and machine
learning approaches.
Related papers
- Cloned Identity Detection in Social-Sensor Clouds based on Incomplete Profiles [5.411585313453657]
We propose a novel approach to effectively detect cloned identities of social-sensor cloud service providers (i.e. social media users) in the face of non-privacy-sensitive profile data.
Named ICD-IPD, the proposed approach first extracts account pairs with similar usernames or screen names from a given set of user accounts collected from a social media.
It then learns a multi-view representation associated with a given account and extracts two categories of features for every single account.
arXiv Detail & Related papers (2024-11-02T18:23:22Z) - Practical Privacy-Preserving Identity Verification using Third-Party Cloud Services and FHE (Role of Data Encoding in Circuit Depth Management) [0.0]
Governments seek to outsource national digital identity verification systems to third-party cloud services.
This leads to increased concerns regarding the privacy of users' personal data.
We propose a privacy-preserving digital identity (ID) verification protocol where the third-party cloud services process the identity data encrypted.
arXiv Detail & Related papers (2024-08-15T08:12:07Z) - Federated Face Forgery Detection Learning with Personalized Representation [63.90408023506508]
Deep generator technology can produce high-quality fake videos that are indistinguishable, posing a serious social threat.
Traditional forgery detection methods directly centralized training on data.
The paper proposes a novel federated face forgery detection learning with personalized representation.
arXiv Detail & Related papers (2024-06-17T02:20:30Z) - Advancing Person Re-Identification: Tensor-based Feature Fusion and
Multilinear Subspace Learning [0.6829272097221595]
We propose a novel PRe-ID system that combines feature representation and multilinear subspace learning.
Our method exploits the power of pre-trained Conrimial Neural Networks (CNNs) as a strong deep feature extractor.
We evaluate our approach by conducting experiments on three datasets VIPeR, GRID, and PRID450s.
arXiv Detail & Related papers (2023-12-24T16:19:22Z) - Client-specific Property Inference against Secure Aggregation in
Federated Learning [52.8564467292226]
Federated learning has become a widely used paradigm for collaboratively training a common model among different participants.
Many attacks have shown that it is still possible to infer sensitive information such as membership, property, or outright reconstruction of participant data.
We show that simple linear models can effectively capture client-specific properties only from the aggregated model updates.
arXiv Detail & Related papers (2023-03-07T14:11:01Z) - Privacy-Preserved Neural Graph Similarity Learning [99.78599103903777]
We propose a novel Privacy-Preserving neural Graph Matching network model, named PPGM, for graph similarity learning.
To prevent reconstruction attacks, the proposed model does not communicate node-level representations between devices.
To alleviate the attacks to graph properties, the obfuscated features that contain information from both vectors are communicated.
arXiv Detail & Related papers (2022-10-21T04:38:25Z) - Cross-Network Social User Embedding with Hybrid Differential Privacy
Guarantees [81.6471440778355]
We propose a Cross-network Social User Embedding framework, namely DP-CroSUE, to learn the comprehensive representations of users in a privacy-preserving way.
In particular, for each heterogeneous social network, we first introduce a hybrid differential privacy notion to capture the variation of privacy expectations for heterogeneous data types.
To further enhance user embeddings, a novel cross-network GCN embedding model is designed to transfer knowledge across networks through those aligned users.
arXiv Detail & Related papers (2022-09-04T06:22:37Z) - Privacy-Aware Identity Cloning Detection based on Deep Forest [9.051524543426451]
This approach leverages non-privacy-sensitive user profile data gathered from social networks and a powerful deep learning model to perform cloned identity detection.
We evaluated the proposed method against the state-of-the-art identity cloning detection techniques and the other popular identity deception detection models atop a real-world dataset.
arXiv Detail & Related papers (2021-10-21T04:55:52Z) - Video Person Re-identification using Attribute-enhanced Features [49.68392018281875]
We propose a novel network architecture named Attribute Salience Assisted Network (ASA-Net) for attribute-assisted video person Re-ID.
To learn a better separation of the target from background, we propose to learn the visual attention from middle-level attribute instead of high-level identities.
arXiv Detail & Related papers (2021-08-16T07:41:27Z) - Going Deeper into Semi-supervised Person Re-identification [12.37129078618206]
We focus on a semi-supervised approach that requires only a subset of the training data to be labeled.
Our method outperforms the state-of-the-art results on three large-scale person re-id datasets.
arXiv Detail & Related papers (2021-07-24T09:28:13Z) - Camera-aware Proxies for Unsupervised Person Re-Identification [60.26031011794513]
This paper tackles the purely unsupervised person re-identification (Re-ID) problem that requires no annotations.
We propose to split each single cluster into multiple proxies and each proxy represents the instances coming from the same camera.
Based on the camera-aware proxies, we design both intra- and inter-camera contrastive learning components for our Re-ID model.
arXiv Detail & Related papers (2020-12-19T12:37:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.