Abstract
Manipulation through inferential attacks in online social networks (OSN) can be achieved by learning the user’s interests through their network and their interactions with the network. Since some users have a higher propensity for disclosure than others, a one-size-fits-all technique for limiting manipulation proves insufficient. In this work, we propose a model that allows the user to adjust their online persona to limit their susceptibility to manipulation based on their preferred disclosure threshold. Our experiment, using real-world data provides a way to measure manipulation gained from a single tweet. We then proffer solutions that show that manipulation gain derived as a result of participating in OSNs can be minimized and adjusted to meet the user’s needs and expectations, giving at least some measure of control to the user.
Keywords
- Manipulation
- Gradient Optimization
- Social Network Analysis
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 675–684. ACM (2011)
Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 2836–2840 (2012). https://doi.org/10.1109/INFCOM.2012.6195711
Guo, C., Pleiss, G., Sun, Y., Weinberger, K.Q.: On calibration of modern neural networks. In: International Conference on Machine Learning, pp. 1321–1330. PMLR (2017)
He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154–165. Springer, Heidelberg (2006). https://doi.org/10.1007/11760146_14
Hensman, J., Matthews, A., Ghahramani, Z.: Scalable variational Gaussian process classification. In: Lebanon, G., Vishwanathan, S.V.N. (eds.) Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, San Diego, California, USA, 09–12 May 2015, vol. 38, pp. 351–360. PMLR (2015). https://proceedings.mlr.press/v38/hensman15.html
Lewis, R.M., Torczon, V.: Pattern search algorithms for bound constrained minimization. SIAM J. Optim. 9(4), 1082–1099 (1999)
Li, H., Zhu, H., Du, S., Liang, X., Shen, X.: Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Dependable Secure Comput. 15(4), 646–660 (2018). https://doi.org/10.1109/TDSC.2016.2604383
Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 29–42 (2007)
Nickisch, H., Rasmussen, C.E.: Approximations for binary Gaussian process classification. J. Mach. Learn. Res. 9(Oct), 2035–2078 (2008)
Osho, A., Goodman, C., Amariucai, G.: MIDMod-OSN: A microscopic-level information diffusion model for online social networks. In: Computational Data and Social Networks. pp. 437–450. Springer International Publishing, Cham (2020)
Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Rasmussen, C.E., Williams, C.K.I.: Gaussian Processes for Machine Learning. Adaptive Computation and Machine Learning, The MIT Press, Cambridge (2005)
Talukder, N., Ouzzani, M., Elmagarmid, A.K., Elmeleegy, H., Yakout, M.: Privometer: privacy protection in social networks. In: 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010), pp. 266–269 (2010). https://doi.org/10.1109/ICDEW.2010.5452715
Wenger, J., Kjellström, H., Triebel, R.: Non-parametric calibration for classification. In: International Conference on Artificial Intelligence and Statistics, pp. 178–190. PMLR (2020)
Yang, F., Liu, Y., Yu, X., Yang, M.: Automatic detection of rumor on sina weibo. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics. p. 13. ACM (2012)
Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, pp. 531–540 (2009)
Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47–77 (2011)
Acknowledgements
This publication is based upon work supported by the National Science Foundation under Grants OIA-2148878 and CMMI-1952206, and by the NPRP grant #12C-33905-SP-165 from the Qatar National Research Fund (a member of Qatar Foundation). The findings achieved herein are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Osho, A., Wei, S., Amariucai, G. (2023). Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks. In: Dinh, T.N., Li, M. (eds) Computational Data and Social Networks . CSoNet 2022. Lecture Notes in Computer Science, vol 13831. Springer, Cham. https://doi.org/10.1007/978-3-031-26303-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-26303-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-26302-6
Online ISBN: 978-3-031-26303-3
eBook Packages: Computer ScienceComputer Science (R0)