skip to main content
research-article

Con&Net: A Cross-Network Anchor Link Discovery Method Based on Embedding Representation

Authors Info & Claims
Published:03 September 2021Publication History
Skip Abstract Section

Abstract

Cross-network anchor link discovery is an important research problem and has many applications in heterogeneous social network. Existing schemes of cross-network anchor link discovery can provide reasonable link discovery results, but the quality of these results depends on the features of the platform. Therefore, there is no theoretical guarantee to the stability. This article employs user embedding feature to model the relationship between cross-platform accounts, that is, the more similar the user embedding features are, the more similar the two accounts are. The similarity of user embedding features is determined by the distance of the user features in the latent space. Based on the user embedding features, this article proposes an embedding representation-based method Con&Net(Content and Network) to solve cross-network anchor link discovery problem. Con&Net combines the user’s profile features, user-generated content (UGC) features, and user’s social structure features to measure the similarity of two user accounts. Con&Net first trains the user’s profile features to get profile embedding. Then it trains the network structure of the nodes to get structure embedding. It connects the two features through vector concatenating, and calculates the cosine similarity of the vector based on the embedding vector. This cosine similarity is used to measure the similarity of the user accounts. Finally, Con&Net predicts the link based on similarity for account pairs across the two networks. A large number of experiments in Sina Weibo and Twitter networks show that the proposed method Con&Net is better than state-of-the-art method. The area under the curve (AUC) value of the receiver operating characteristic (ROC) curve predicted by the anchor link is 11% higher than the baseline method, and Precision@30 is 25% higher than the baseline method.

References

  1. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. 2010. Abusing social networks for automated user profiling. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. Jha S., Sommer R., Kreibich C. (Eds.), Lecture Notes in Computer Science, Vol. 6307, Springer, 422–441.Google ScholarGoogle Scholar
  2. Sergey Bartunov, Anton Korshunov, Seung-Taek Park, Wonho Ryu, and Hyungdong Lee. 2012. Joint link-attribute user identity resolution in online social networks. In Proceedings of the 6th International Conference on Knowledge Discovery and Data Mining, Workshop on Social Network Mining and Analysis. ACM.Google ScholarGoogle Scholar
  3. Sonja Buchegger, Doris Schiöberg, Le-Hung Vu, and Anwitaman Datta. 2009. PeerSoN: P2P social networking: Early experiences and insights. In Proceedings of the 2nd ACM EuroSys Workshop on Social Network Systems. ACM, 46–52.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Rhonda Chaytor, Edward Brown, and Todd Wareham. 2006. Privacy advisors for personal information management. In Proceedings of the SIGIR Workshop on Personal Information Management. 28–31.Google ScholarGoogle Scholar
  5. Zhiyuan Cheng, James Caverlee, and Kyumin Lee. 2010. You are where you tweet: A content-based approach to geo-locating twitter users. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management. ACM, 759–768.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Xiaokai Chu, Xinxin Fan, Di Yao, Zhihua Zhu, Jianhui Huang, and Jingping Bi. 2019. Cross-network embedding for multi-network alignment. In Proceedings of the 2019 World Wide Web Conference. 273–284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Yi Cui, Jian Pei, Guanting Tang, Wo-Shun Luk, Daxin Jiang, and Ming Hua. 2013. Finding e-mail correspondents in online social networks. World Wide Web 16, 2 (2013), 195–218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Daniel M. Dunlavy, Tamara G. Kolda, and Evrim Acar. 2011. Temporal link prediction using matrix and tensor factorizations. ACM Transactions on Knowledge Discovery from Data 5, 2 (2011), 10.Google ScholarGoogle Scholar
  9. Shuo Feng, Qian Wang, Derong Shen, Yue Kou, Tiezheng Nie, and Ge Yu. 2017. User identification across social networks based on global view features. In Proceedings of the 2017 14th Web Information Systems and Applications Conference. IEEE, 93–98.Google ScholarGoogle ScholarCross RefCross Ref
  10. Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Runting Shi, and Dawn Song. 2014. Joint link prediction and attribute inference using a social-attribute network. ACM Transactions on Intelligent Systems and Technology 5, 2 (2014), 27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 855–864.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Desislava Hristova, Anastasios Noulas, Chloë Brown, Mirco Musolesi, and Cecilia Mascolo. 2016. A multilayer approach to multiplexity and link prediction in online geo-social networks. EPJ Data Science 5, 1 (2016), 24.Google ScholarGoogle ScholarCross RefCross Ref
  13. Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem Beyah. 2016. Seed-based de-anonymizability quantification of social networks. IEEE Transactions on Information Forensics and Security 11, 7 (2016), 1398–1411.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Xiangnan Kong, Jiawei Zhang, and Philip S. Yu. 2013. Inferring anchor links across multiple heterogeneous social networks. In Proceedings of the 22nd ACM International Conference on Information and Knowledge Management. ACM, 179–188.Google ScholarGoogle Scholar
  15. Nitish Korula and Silvio Lattanzi. 2014. An efficient reconciliation algorithm for social networks. Proceedings of the VLDB Endowment 7, 5 (2014), 377–388.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Danai Koutra, Hanghang Tong, and David Lubensky. 2013. Big-align: Fast bipartite graph alignment. In Proceedings of the 2013 IEEE 13th International Conference on Data Mining. IEEE, 389–398.Google ScholarGoogle ScholarCross RefCross Ref
  17. Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proceedings of the 31st International Conference on International Conference on Machine Learning. 1188–1196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. Li, Y. Shang, Y. Cao, Y. Li, and Y. Liu. 2020. Type-aware anchor link prediction across heterogeneous networks based on graph attention network. Proceedings of the AAAI Conference on Artificial Intelligence 34, 1 (2020), 147–155.Google ScholarGoogle Scholar
  19. Jiongqian Liang, Deepak Ajwani, Patrick K. Nicholson, Alessandra Sala, and Srinivasan Parthasarathy. 2016. What links alice and bob?: Matching and ranking semantic patterns in heterogeneous networks. In Proceedings of the 25th International Conference on World Wide Web. 879–889.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jing Liu, Fan Zhang, Xinying Song, Young-In Song, Chin-Yew Lin, and Hsiao-Wuen Hon. 2013. What’s in a name?: An unsupervised approach to link users across communities. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining. ACM, 495–504.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. L. Liu, X. Li, W. K. Cheung, and L. Liao. 2020. Structural representation learning for user alignment across social networks. IEEE Transactions on Knowledge and Data Engineering 32, 9 (2020), 1824–1837.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Siyuan Liu, Shuhui Wang, Feida Zhu, Jinbo Zhang, and Ramayya Krishnan. 2014. Hydra: Large-scale social identity linkage via heterogeneous behavior modeling. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. ACM, 51–62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence 35, 8 (2013), 1798–1828.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing social networks. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy. IEEE, 173–187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Narayanan and V. Shmatikov. 2009. De-anonymizing social networks. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy. 173–187.Google ScholarGoogle Scholar
  26. Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, and Pere Manils. 2011. How unique and traceable are usernames? In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Fischer-Hbner S. and Hopper N. (Eds.), Lecture Notes in Computer Science, Vol. 6794. Springer, 1–17.Google ScholarGoogle Scholar
  27. Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 701–710.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Yizhou Sun, Rick Barber, Manish Gupta, Charu C. Aggarwal, and Jiawei Han. 2011. Co-author relationship prediction in heterogeneous bibliographic networks. In Proceedings of the 2011 International Conference on Advances in Social Networks Analysis and Mining. IEEE, 121–128.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Shulong Tan, Ziyu Guan, Deng Cai, Xuzhen Qin, Jiajun Bu, and Chun Chen. 2014. Mapping users across networks by manifold alignment on hypergraph. In Proceedings of the 28th AAAI Conference on Artificial Intelligence. 159–165.Google ScholarGoogle Scholar
  30. Shinji Umeyama. 1988. An eigendecomposition approach to weighted graph matching problems. IEEE Transactions on Pattern Analysis and Machine Intelligence 10, 5 (1988), 695–703.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Peng Wang, BaoWen Xu, YuRong Wu, and XiaoYu Zhou. 2015. Link prediction in social networks: The state-of-the-art. Science China Information Sciences 58, 1 (2015), 1–38.Google ScholarGoogle ScholarCross RefCross Ref
  32. S. K. Wang, X. T. Li, Y. M. Ye, S. S. Feng, R. Y. K. Lau, X. H. Huang, and X. L. Du. 2019. Anchor link prediction across attributed networks via network embedding. Entropy 21, 3 (2019), 13. Google ScholarGoogle Scholar
  33. Rui Ye, Xin Li, Yujie Fang, Hongyu Zang, and Mingzhong Wang. 2019. A vectorized relational graph convolutional network for multi-relational network alignment. In Proceedings of the 28th International Joint Conference on Artificial Intelligence. 4135–4141.Google ScholarGoogle ScholarCross RefCross Ref
  34. Reza Zafarani and Huan Liu. 2009. Connecting corresponding identities across communities. In Proceedings of the 3rd International AAAI Conference on Weblogs and Social Media. 354–357.Google ScholarGoogle Scholar
  35. Reza Zafarani and Huan Liu. 2013. Connecting users across social media sites: A behavioral-modeling approach. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 41–49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Jiawei Zhang, Xiangnan Kong, and Philip S. Yu. 2014. Transferring heterogeneous links across location-based social networks. In Proceedings of the 7th ACM International Conference on Web Search and Data Mining. ACM, 303–312.Google ScholarGoogle Scholar
  37. Jiawei Zhang and S. Yu Philip. 2015. Multiple anonymized social networks alignment. In Proceedings of the 2015 IEEE International Conference on Data Mining. IEEE, 599–608.Google ScholarGoogle Scholar
  38. Jiawei Zhang, Weixiang Shao, Senzhang Wang, Xiangnan Kong, and S. Yu Philip. 2015. Partial network alignment with generic stable matching. In Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration. IEEE, 166–173.Google ScholarGoogle Scholar
  39. Jiawei Zhang and Philip S. Yu. 2015. Integrated anchor and social link predictions across social networks. In Proceedings of the 24th International Conference on Artificial Intelligence. 2125–2131.Google ScholarGoogle Scholar
  40. Yutao Zhang, Jie Tang, Zhilin Yang, Jian Pei, and Philip S. Yu. 2015. Cosnet: Connecting heterogeneous social networks with local and global consistency. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1485–1494.Google ScholarGoogle Scholar
  41. Junxing Zhu, Jiawei Zhang, Quanyuan Wu, Yan Jia, Bin Zhou, Xiaokai Wei, and Philip Yu. 2017. Constrained active learning for anchor link prediction across multiple heterogeneous social networks. Sensors 17, 8 (2017), 1786.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Con&Net: A Cross-Network Anchor Link Discovery Method Based on Embedding Representation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Knowledge Discovery from Data
      ACM Transactions on Knowledge Discovery from Data  Volume 16, Issue 2
      April 2022
      514 pages
      ISSN:1556-4681
      EISSN:1556-472X
      DOI:10.1145/3476120
      Issue’s Table of Contents

      Copyright © 2021 Association for Computing Machinery.

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 September 2021
      • Accepted: 1 May 2021
      • Revised: 1 April 2021
      • Received: 1 November 2020
      Published in tkdd Volume 16, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format