Computer Science ›› 2024, Vol. 51 ›› Issue (5): 12-20.doi: 10.11896/jsjkx.230300172

• Discipline Frontier • Previous Articles     Next Articles

Survey of Research and Application of User Identity Linkage Technology in Cyberspace

WANG Gengrun   

  1. National Digital Switching System Engineering&Technological R&D Center,Information Engineering University,Zhengzhou 450002,China
  • Received:2023-03-21 Revised:2023-11-27 Online:2024-05-15 Published:2024-05-08
  • About author:WANG Gengrun,born in 1987,Ph.D,associate researcher.His main research interests include telecommunication network security and user behavior analysis in cyberspace.
  • Supported by:
    National Natural Science Foundation of China(61803384) and Major Science and Technology Program of Henan Province(221100210700-2).

Abstract: In recent years,with the development of mobile Internet technology and the increase of user demand,there are more and more various virtual accounts in cyberspace,and users always have multiple accounts in different applications or even the same platform.At the same time,due to the virtual nature of cyberspace,the relationship between the users' virtual identity and the real social identity is usually weak,and the illegal users in cyberspace are difficult to find.Therefore,driven by the needs of service recommendation and evidence collection,the user identity linkage technology,with cyberspace user virtual identity aggregation and virtual-real identity mapping as the main research content,has been developed rapidly.For this reason,the user identity linkage technology in cyberspace is summarized.Firstly,the scientific problems solved by this technology is defined,and then the typical characteristics of the user identity and the related technologies are introduced.Finally,the datasets and verification stan-dards are presented,and the challenges of the user identity linkage are discussed.

Key words: Cyberspace security, User identity linkage, Virtual identity aggregation, Virtual and real identity mapping, User identity feature, Social network, Traffic data

CLC Number: 

  • TP393
[1]XIE L.Research on Information Investigation of Telecom Network Fraud [J].Journal of People's Public Security University of China(Science and Technology),2020,26(3):85-93.
[2]ADOMAVICIUS G,TUZHILIN A.Toward the next generation of recommender systems:A survey of the state-of-the-art and possible extensions [J].IEEE Transactions on Knowledge and Data Engineering,2005,17(6):734-749.
[3]LIU X Z,XIA T,YU Y Y,et al.Cross social media recommendation[C]//The International AAAI Conference on Web and Social Media.[S.l.]:AAAI,2016:1-10.
[4]XING L,DENG K,WU H,et al.A Survey of Across Social Net-works User Identification [J].IEEE Access,2019,7:137472-137488.
[5]ZAHRA K,AZAM F,BUTT W H,et al.User Identification on Social Networks Through Text Mining Techniques:A Syste-matic Literature Review[C]//International Conference on Information Science and Applications.Singapore:Springer,2019.
[6]GOMAA W H,FAHMY A A.A Survey of Text Similarity Approaches [J].International Journal of Computer Applications,2013,68(13):13-18,.
[7]XING L,DENG K K,WU H H,et al.Review of User Identification across Social Networks:The Complex Network Approach [J].Journal of University of Electronic Science and Technology of China,2020,49(6):905-917.
[8] LUAN M M,ZHAO T,YANG X H,et al.A Survey of Cross Social Network User Identification at Home and Abroad [J].Journal of Qilu University of Technology,2020,34(4):55-60.
[9]SHEN W,WANG J Y,LUO P,et al.Linking named entities in Tweets with knowledge base via user interest modeling[C]//Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2013:68-76.
[10]LIU S,WANG S,ZHU F,et al.HYDRA:Large-Scale socialidentity linkage via heterogeneous behavior modeling[C]//Proceedings of the 2014 ACM SIGMOD International Conference.on Management of Data.New York:ACM Press,2014:51-62.
[11]MOHAMED A,QIAN K,ELHOSEINY M,et al.Social-STGCNN:A Social Spatio-Temporal Graph Convolutional Neural Network for Human Trajectory Prediction[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).IEEE,2020.
[12]ZHOU F,LIU L,ZHANG K,et al.DeepLink:A Deep Learning Approach for User Identity Linkage[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,1313-1321.
[13]DENG K K,XING L,ZHENG L,et al.A User IdentificationAlgorithm Based on User Behavior Analysis in Social Networks [J].IEEE Access,2019,7:47114-47123.
[14]ZAFARANI R,TANG L,LIU H.User identification across social media [J].ACM Transactions on Knowledge Discovery from Data,2015,10(2):1-30.
[15]GANG H,SHA C.Implement Of Network User Virtual Identity Merging Based on Spark[C]//International Conference on Communication and Electronic Information Engineering(CEIE 2016).2017.
[16]ZHOU F,GAO Q,TRAJCEVSKI G,et al.Trajectory-user lin-king via variational autoencoder[C]//Proceedings of the 27th International Joint Conference on Artificial Intelligence.Stockholm,Sweden,2018:3212-3218.
[17]CHEN H C,XU Q,HUANG R Y,et al.User IdentificationAcross Social Networks Based on User Trajectory [J].Journal of Electronics & Information Technology,2018,40(11):2758-2764.
[18]FU S,WANG G,XIA S,et al.A Multi-Granularity Representation Learning Framework for User Identification Across Social Networks[C]//2019 International Joint Conference on Rough Sets(IJCRS).Springer,2019.
[19]XING L,DENG K K,WU H H,et al.Behavioral Habits-Based User Identification Across Social Networks [J].Symmetry,2019,11(9):1134.
[20]JAMJUNTRA L,CHARTSUWAN P,WONGLIMSAMUT P,et al.Social network user identification[C]//2017 9th International Conference on Knowledge and Smart Technology(KST).IEEE,2017.
[21]ZHAO D,NING Z,MING X,et al.An Improved User Identification Method Across Social Networks Via Tagging Behaviors[C]//2018 IEEE 30th International Conference on Tools with Artificial Intelligence(ICTAI).IEEE,2018.
[22]GAO Q,ZHOU F,ZHANG K,et al.Identifying human mobility via trajectory embeddings[C]//Proceedings of the 26th International Joint Conference on Artificial Intelligence.Melbourne,Australia,2017:1689-1695.
[23]ZHOU F,CHEN S,WU J,et al.Trajectory-User Linking via Graph Neural Network[C]//IEEE International Conference on Communications(ICC 2021).IEEE,2021.
[24]ZHOU X,LIANG X,ZHANG H,et al.Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks [J].IEEE Transactions on Knowledge and Data Engineering,2016,28(2):411-424.
[25]ZHANG W,LI Y,ZHANG J,et al.A User Trajectory Identification Model with Fusion of Spatio-Temporal Behavior and Social Relation [J].Chinese Journal of Computers,2021(11):44.
[26]KONG X,ZHANG J,YU P S.Inferring anchor links acrossmultiple heterogeneous social networks[C]//ACM Interna-tional Conference on Information & Knowledge Management.ACM,2013.
[27]YANG Y,ZHAN D C,WU Y F,et al.Multi-network UserIdentification via Graph-Aware Embedding[C]//2018 Pacific-Asia Conference on Knowledge Discovery and Data Mining.Springer,2018.
[28]KOJIMA K,IKEDA K,TANI M.Short Paper:User Identification across Online Social Networks Based on Similarities among Distributions of Friends' Locations[C]//2019 IEEE Interna-tional Conference on Big Data(Big Data).IEEE,2019.
[29]ZENG W,TANG R,WANG H,et al.User Identification Based on Integrating Multiple User Information across Online Social Networks [J].Security and Communication Networks,2021:1-14.
[30]YING C X,CAI T L,LUO S J,et al.Do transformers really perform badly for graph representation?[C]//Advances in Neural Information Processing Systems 34.2021:28877-28888.
[31]CHEN H,YIN H,SUN X,et al.Multi-level Graph Convolu-tional Networks for Cross-platform Anchor Link Prediction[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2020:1503-1511.
[32]LIU Q,LI Y,DUAN H,et al.Knowledge Graph ConstructionTechniques [J].Journal of Computer Research and Development,2016,53(3):582-600.
[33]WU X,JIANG T,ZHU Y,et al.Knowledge graph for china's genealogy [J].IEEE Transactions on Knowledge and Data Engineering,2021,35(1):634-646.
[34]SUN Z,WANG C,HU W,et al.Knowledge Graph AlignmentNetwork with Gated Multi-Hop Neighborhood Aggregation [J].Proceedings of the AAAI Conference on Artificial Intelligence,2020,34(1):222-229.
[35]LI J,WANG Z,XIAO Z,et al.Large scale instance matching via multiple indexes and candidate selection [J].Knowledge-Based Systems,2013,50:112-120.
[36]LU W,WU C.Literature Review on Entity Linking [J].Journal of the China Society for Scientific and Technical Information,2015,34(1):105-112.
[37]ZHENG Y,WANG L H,ZHANG R C,et al.GeoLife:managing and understanding your past life over maps[C]//Proceedings of the 9th International Conference on Mobile Data Management.IEEE Press,2008:211-212.
[38]SANG J T,LU D Y,XU C S.Overlapped User-based Cross-network Analysis:Exploring Variety in Big Social Media Data [J].Chinese Science Bulletin,2014,59(36):3554-3560.
[39]TAO F,LIU W R,LIU J H,et al.Digital Twin and Its Potential Application Exploring [J].Computer Integrated Manufacturing Systems,2018,24(1):4-21.
[40]LI L,MIN Z.The Strategy of Mining Association Rule Based on Cloud Computing[C]//2011 International Conference on Business Computing and Global Informatization(BCGIN).IEEE,2011.
[41]SUN Y,KAMEL M S,WONG A,et al.Cost-sensitive boosting for classification of imbalanced data[J].Pattern Recognition,2007,40(12):3358-3378.
[42]PING R,ZHOU Y S,LI D.Cost sensitive random forest classifi-cation algorithm for highly unbalanced data [J].Pattern Recognition and Artificial Intelligence 2020,33(3):249-257.
[43]LI T,SRIKUMAR V.Augmenting neural networks with first-order logic[C]//Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics.ACL,2019:102-113.
[44]LV L Y.Link Prediction on Complex Networks [J].Journal of University of Electronic Science and Technology of China,2010,39(5):651-661.
[45]LIN Y J,WU Y,LI H B.Internet Hirelings Semi-supervised Detection of Weibo Based on Affinity Propagation Algorithm [J].Netinfo Security,2022,22(3):85-96.
[1] SHAN Xiaohuan, SONG Rui, LI Haihai, SONG Baoyan. Event Recommendation Method with Multi-factor Feature Fusion in EBSN [J]. Computer Science, 2023, 50(7): 60-65.
[2] CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11.
[3] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[4] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[5] YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151.
[6] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
[7] ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109.
[8] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[9] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[10] SONG Xin-yue, SHUAI Tian-ping, CHEN Bin. Misinformation Correction Maximization Problem with Edge Addition in Social Networks [J]. Computer Science, 2022, 49(11): 316-325.
[11] WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277.
[12] TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129.
[13] ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337.
[14] BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248.
[15] ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!