Personality Privacy Protection Method of Social Users Based on Generative Adversarial Networks

被引:2
|
作者
Sui, Yi [1 ]
Wang, Xiujuan [1 ]
Zheng, Kangfeng [2 ]
Shi, Yutong [1 ]
Cao, Siwei [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划;
关键词
Text processing - Metadata - Electric equipment protection - Generative adversarial networks - Data privacy - Reinforcement learning;
D O I
10.1155/2022/2419987
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Obscuring or otherwise minimizing the release of personality information from potential victims of social engineering attacks effectively interferes with an attacker's personality analysis and reduces the success rate of social engineering attacks. We propose a text transformation method named PerTransGAN using generative adversarial networks (GANs) to protect the personality privacy hidden in text data. Making use of reinforcement learning, we use the output of the discriminator as a reward signal to guide the training of the generator. Moreover, the model extracts text features from the discriminator network as additional semantic guidance signals. And the loss function of the generator adds a penalty item to reduce the weight of words that contribute more to personality information in the real text so as to hide the user's personality privacy. In addition, the semantic and personality modules are designed to calculate the semantic similarity and personality distribution distance between the real text and the generated text as a part of the objective function. Experiments show that the self-attention module and semantic module in the generator improved the content retention of the text by 0.11 compared with the baseline model and obtained the highest BLEU score. In addition, with the addition of penalty item and personality module, compared with the classification accuracy of the original data, the accuracy of the generated text in the personality classifier decreased by 20%. PerTransGAN model preserves users' personality privacy as found in user data by transforming the text and preserving semantic similarity while blocking privacy theft by attackers.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] An Image Privacy Protection Algorithm Based on Adversarial Perturbation Generative Networks
    Tong, Chao
    Zhang, Mengze
    Lang, Chao
    Zheng, Zhigao
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [2] A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks
    Zhu, Wenqiu
    Wang, Xiaoyi
    Wu, Yuezhong
    Zou, Guang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [3] A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks
    Li, Aiping
    Fang, Junbin
    Jiang, Qianye
    Zhou, Bin
    Jia, Yan
    [J]. WEB INFORMATION SYSTEMS ENGINEERING, WISE 2020, PT II, 2020, 12343 : 227 - 239
  • [4] Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy Protection
    Wu, Bingzhe
    Zhao, Shiwan
    Chen, ChaoChao
    Xu, Haoyang
    Wang, Li
    Zhang, Xiaolu
    Sun, Guangyu
    Zhou, Jun
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [5] Differential Privacy Images Protection Based on Generative Adversarial Network
    Yang, Ren
    Ma, Xuebin
    Bai, Xiangyu
    Su, Xiangdong
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1688 - 1695
  • [6] Generative Adversarial Network Based Image Privacy Protection Algorithm
    He, Yuwen
    Zhang, Chunhong
    Zhu, Xinning
    Ji, Yang
    [J]. TENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2018), 2019, 11069
  • [7] Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks
    Adewole, Kayode S.
    Torra, Vicenc
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 279 - 286
  • [8] Advanced Trajectory Privacy Protection with Attention Mechanism and Auxiliary Classifier Generative Adversarial Networks
    Shin, Jihwan
    Song, Yeji
    Cheong, Yoo-Young
    Ahn, Jinhyun
    Lee, Taewhi
    Im, Dong-Hyuk
    [J]. 38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 257 - 261
  • [9] Image registration method based on Generative Adversarial Networks
    Sun, Yujie
    Qi, Heping
    Wang, Chuanyou
    Tao, Lei
    [J]. 2020 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2020), 2020, : 183 - 188
  • [10] Age Estimation Method Based on Generative Adversarial Networks
    Ning, Xin
    Li, Weijun
    Sun, Linjun
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 333 - 340