Inferring User Profiles in Online Social Networks Based on Convolutional Neural Network

  • Xiaoxue Li
  • Yanan Cao
  • Yanmin ShangEmail author
  • Yanbing Liu
  • Jianlong Tan
  • Li Guo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10412)


We propose a novel method to infer missing attributes (e.g., occupation, gender, and location) of online social network users, which is an important problem in social network analysis. Existing works generally utilize classification algorithms or label propagation methods to solve this problem. However, these works had to train a specific model for inferring one kind of missing attributes, which achieve limited precision rates in inferring multi-value attributes. To address above challenges, we proposed a convolutional neural network architecture to infer users’ all missing attributes based on one trained model. And it’s novel that we represent the input matrix using features of target user and his neighbors, including their explicit attributes and behaviors which are available in online social networks. In the experiments, we used a real-word large scale dataset with 220,000 users, and results demonstrated the effectiveness of our method and the importance of social links in attribute inference. Especially, our work achieved a 76.28% precision in the occupation inference task which improved upon the state of the art.


User attributes mining Deep neural network Social network analysis 



This work was supported by the National Natural Science Foundation of China grants (NO. 61403369, NO. 61602466), the National Key Research and Development program (No. 2016YFB0801304).


  1. 1.
    Li, R., Wang, C., Chang, K.C.C.: User profiling in an ego network: co-profiling attributes and relationships. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 819–830. ACM (2014)Google Scholar
  2. 2.
    Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. U.S.A. 110(15), 5802–5805 (2013)CrossRefGoogle Scholar
  3. 3.
    Dougnon, R.Y., Fournier-Viger, P., Nkambou, R.: Inferring user profiles in online social networks using a partial social graph. In: Barbosa, D., Milios, E. (eds.) CANADIAN AI 2015. LNCS, vol. 9091, pp. 84–99. Springer, Cham (2015). doi: 10.1007/978-3-319-18356-5_8 Google Scholar
  4. 4.
    Ciot, M., Sonderegger, M., Ruths, D.: Gender inference of Twitter users in non-English contexts. In: EMNLP, pp. 1136–1145 (2013)Google Scholar
  5. 5.
    Petkos, G., Papadopoulos, S., Kompatsiaris, Y.: Social circle discovery in ego-networks by mining the latent structure of user connections and profile attributes. In: 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 880–887. IEEE (2015)Google Scholar
  6. 6.
    Jurgens, D.: That’s what friends are for: inferring location in online social media platforms based on social relationships. ICWSM 13, 273–282 (2013)Google Scholar
  7. 7.
    Dong, Y., Tang, J., Wu, S., et al.: Link prediction and recommendation across heterogeneous social networks. In: 2012 IEEE 12th International Conference on Data Mining (ICDM), pp. 181–190. IEEE (2012)Google Scholar
  8. 8.
    Mislove, A., Viswanath, B., Gummadi, K.P., et al.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM International Conference on Web Search and Data Mining, pp. 251–260. ACM (2010)Google Scholar
  9. 9.
    Lindamood, J., Heatherly, R., Kantarcioglu, M., et al.: Inferring private information using social network data. In: Proceedings of the 18th International Conference on World Wide Web, pp. 1145–1146. ACM (2009)Google Scholar
  10. 10.
    Davis Jr., C.A., Pappa, G.L., de Oliveira, D.R.R., et al.: Inferring the location of twitter messages based on user relationships. Trans. GIS 15(6), 735–751 (2011)CrossRefGoogle Scholar
  11. 11.
    Mo, M., Wang, D., Li, B., et al.: Exploit of online social networks with semi-supervised learning. In: The 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2010)Google Scholar
  12. 12.
    Collobert, R., Weston, J., Bottou, L., et al.: Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12, 2493–2537 (2011)zbMATHGoogle Scholar
  13. 13.
    Gong, N.Z., Talwalkar, A., Mackey, L., et al.: Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. (TIST) 5(2), 27 (2014)Google Scholar
  14. 14.
    Yin, Z., Gupta, M., Weninger, T., et al.: A unified framework for link recommendation using random walks. In: 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 152–159. IEEE (2010)Google Scholar
  15. 15.
    Yin, Z., Gupta, M., Weninger, T., et al.: Linkrec: a unified framework for link recommendation with user attributes and graph structure. In: Proceedings of the 19th International Conference on World Wide Web. pp. 1211–1212. ACM (2010)Google Scholar
  16. 16.
    Gong, N.Z., Liu, B.: You are who you know and how you behave: attribute inference attacks via users’ social friends and behaviors. arXiv preprint arXiv:1606.05893 (2016)
  17. 17.
    Xu, F.X., Liang Ying, H.-B.: A sock-puppet ralation detection method on social network. J. Chinese Inf. Process. 28(6), 162–168 (2014)Google Scholar
  18. 18.
    Thomas, K., Grier, C., Nicol, David M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14527-8_14 CrossRefGoogle Scholar
  19. 19.
    Weinsberg, U., Bhagat, S. Ioannidis, Taft, N.: Blurme: inferring and obfuscating user gender based on ratings. In: RecSys (2012)Google Scholar
  20. 20.
    Ye, M., Liu, X., Lee, W.-C.: Exploring social influence for recommendation a probabilistic generative model approach. In: SIGIR (2012)Google Scholar
  21. 21.
    Otterbacher, J.: Inferring gender of movie reviewers: exploiting writing style, content and metadata. In: CIKM (2010)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Xiaoxue Li
    • 1
    • 2
  • Yanan Cao
    • 2
  • Yanmin Shang
    • 2
    Email author
  • Yanbing Liu
    • 2
  • Jianlong Tan
    • 2
  • Li Guo
    • 2
  1. 1.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina
  2. 2.Institute of Information EngineeringChinese Academy of SciencesBeijingChina

Personalised recommendations