{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:22:30Z","timestamp":1767183750516,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFC0830500"],"award-info":[{"award-number":["2018YFC0830500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736205","61603290"],"award-info":[{"award-number":["U1736205","61603290"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Basic Research Grant","award":["JCYJ20170816100819428"],"award-info":[{"award-number":["JCYJ20170816100819428"]}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2019JM159"],"award-info":[{"award-number":["2019JM159"]}]},{"name":"Natural Science Basic Research in Zhejiang Province of China","award":["LGG18F020016"],"award-info":[{"award-number":["LGG18F020016"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12083-020-01068-0","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T13:28:22Z","timestamp":1615296502000},"page":"1596-1607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A machine learning based approach for user privacy preservation in social networks"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5579-638X","authenticated-orcid":false,"given":"Yuanming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuchao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Pinghui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"key":"1068_CR1","doi-asserted-by":"crossref","unstructured":"Bell R, Koren Y, Volinsky C (2007) Modeling relationships at multiple scales to improve accuracy of large recommender systems. In: Proceedings of ACM SIGKDD","DOI":"10.1145\/1281192.1281206"},{"key":"1068_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau J (2012) The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on security and privacy","DOI":"10.1109\/SP.2012.49"},{"key":"1068_CR3","doi-asserted-by":"crossref","unstructured":"Bonneau J, Herley C, Oorschot PCv, Stajano F (2012) The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on security and privacy","DOI":"10.1109\/SP.2012.44"},{"key":"1068_CR4","doi-asserted-by":"crossref","unstructured":"de Carn\u00e9 de Carnavalet X, Mannan M (2014) From very weak to very strong: analyzing password-strength meters. In: Proceedings of NDSS","DOI":"10.14722\/ndss.2014.23268"},{"key":"1068_CR5","unstructured":"Castelluccia C, Abdelberi C, D\u00fcrmuth M, Perito D (2013) When privacy meets security: leveraging personal information for password cracking. arXiv:1304.6584"},{"key":"1068_CR6","doi-asserted-by":"crossref","unstructured":"Wang Y, Su Z, Xu Q, Yang T, Zhang N (2019) A novel charging scheme for electric vehicles with smart communities in vehicular networks. In: IEEE Transactions on Vehicular Technology","DOI":"10.1109\/TVT.2019.2923851"},{"key":"1068_CR7","unstructured":"Castelluccia C, D\u00fcrmuth M., Perito D (2012) Adaptive password-strength meters from markov models. In: Proceedings of NDSS"},{"key":"1068_CR8","doi-asserted-by":"crossref","unstructured":"Das A, Bonneau J, Caesar M, Borisov N, Wang X (2014) The tangled web of password reuse. In: Proceedings of NDSS","DOI":"10.14722\/ndss.2014.23357"},{"key":"1068_CR9","unstructured":"Li Z, Han W, Xu W (2014) A large-scale empirical analysis on chinese web passwords. In: Proceedings of USENIX security symposium"},{"key":"1068_CR10","doi-asserted-by":"crossref","unstructured":"You Z, Han X, L\u00fc L., Yeung CH (2015) Empirical studies on the network of social groups: the case of tencent QQ. PLoS ONE 10(7)","DOI":"10.1371\/journal.pone.0130538"},{"key":"1068_CR11","doi-asserted-by":"crossref","unstructured":"Gu Y, Zhang X, Liu Z, Ren F (2019) BeSense: leveraging WiFi channel data and computational intelligence for behavior analysis. In: IEEE Computational intelligence magazine","DOI":"10.1109\/MCI.2019.2937610"},{"key":"1068_CR12","doi-asserted-by":"crossref","unstructured":"Hu H, Liu Z, An J (2020) Mining mobile intelligence for wireless systems: a deep neural network approach. In: IEEE Computational intelligence magazine","DOI":"10.1109\/MCI.2019.2954641"},{"key":"1068_CR13","doi-asserted-by":"crossref","unstructured":"Dey R, Tang C, Ross KW, Saxena N (2012) Estimating age privacy leakage in online social networks. In: Proceedings of IEEE INFOCOM","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"1068_CR14","doi-asserted-by":"crossref","unstructured":"Gundecha P, Barbier G, Liu H (2011) Exploiting vulnerability to secure user privacy on a social networking site. In: Proceedings of ACM SIGKDD","DOI":"10.1145\/2020408.2020489"},{"key":"1068_CR15","doi-asserted-by":"crossref","unstructured":"Su Z, Wang Y, Xu Q, Fei M, Tian Y, Zhang N (2019) A secure charging scheme for electric vehicles with smart communities in energy blockchain. In: IEEE Internet of things journal","DOI":"10.1109\/JIOT.2018.2869297"},{"key":"1068_CR16","doi-asserted-by":"crossref","unstructured":"Liu Y, Gummadi KP, Krishnamurthy B, Mislove A (2011) Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of ACM SIGCOMM IMC","DOI":"10.1145\/2068816.2068823"},{"key":"1068_CR17","doi-asserted-by":"crossref","unstructured":"Zheleva E, Getoor L (2009) To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW","DOI":"10.1145\/1526709.1526781"},{"key":"1068_CR18","doi-asserted-by":"crossref","unstructured":"Wang Y, Su Z, Zhang N, Benslimane A (2020) Learning in the air: secure federated learning for UAV-assisted crowdsensing. In: IEEE Transactions on network science and engineering","DOI":"10.1109\/TNSE.2020.3014385"},{"key":"1068_CR19","doi-asserted-by":"crossref","unstructured":"Wang Y, Su Z, Zhang N (2019) BSIS: blockchain-based secure incentive scheme for energy delivery in vehicular energy network. In: IEEE Transactions on industrial informatics","DOI":"10.1109\/TII.2019.2908497"},{"key":"1068_CR20","doi-asserted-by":"crossref","unstructured":"Li Y, Peng Y, Zhang Z, Yin H, Xu Q. (2019) Matching user accounts across social networks based on username and display name. In: Proceedings of WWW","DOI":"10.1007\/s11280-018-0571-4"},{"key":"1068_CR21","unstructured":"Oktay H, Firat A, Ertem Z (2014) Demographic breakdown of twitter users: an analysis based on names. In: Proceedings of ASE BIGDATA\/SOCIALCOM\/CYBERSECURITY"},{"key":"1068_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen D, Gravel R, Trieschnigg D, Meder T (2013) How old do you think i am?; a study of language and age in twitter. In: Proceedings of ICWSM","DOI":"10.1145\/2528272.2528276"},{"key":"1068_CR23","doi-asserted-by":"crossref","unstructured":"Liao L, Jiang J, Lim E-P, Huang H (2014) A study of age gaps between online friends. In: Proceedings of HT","DOI":"10.1145\/2631775.2631800"},{"key":"1068_CR24","doi-asserted-by":"crossref","unstructured":"Chen X, et al. (2020) Age of information aware radio resource management in vehicular networks: a proactive deep reinforcement learning perspective. In: IEEE Transactions on wireless communications","DOI":"10.1109\/TWC.2019.2963667"},{"key":"1068_CR25","unstructured":"Zhang J, Hu X, Zhang Y, Liu H (2016) Your age is no secret: inferring microbloggers\u2019 ages via content and interaction analysis. In: Proceedings of AAAI"},{"key":"1068_CR26","doi-asserted-by":"crossref","unstructured":"Ma H, King I, Lyu MR (2009) Learning to recommend with social trust ensemble. In: Proceedings of ACM SIGIR","DOI":"10.1145\/1571941.1571978"},{"key":"1068_CR27","doi-asserted-by":"crossref","unstructured":"Yang X, Steck H, Liu Y (2012) Circle-based recommendation in online social networks. In: Proceedings of ACM SIGKDD","DOI":"10.1145\/2339530.2339728"},{"key":"1068_CR28","doi-asserted-by":"crossref","unstructured":"Wang X, Donaldson R, Nell C, Gorniak P, Ester M, Bu J (2016) Recommending groups to users using user-group engagement and time-dependent matrix factorization. In: AAAI","DOI":"10.1609\/aaai.v30i1.10160"},{"key":"1068_CR29","doi-asserted-by":"crossref","unstructured":"Wang X, Hoi SCH, Ester M, Bu J, Chen C (2017) Learning personalized preference of strong and weak ties for social recommendation. In: WWW","DOI":"10.1145\/3038912.3052556"},{"key":"1068_CR30","doi-asserted-by":"crossref","unstructured":"Wang X, Zhu W, Liu C (2019) Social recommendation with optimal limited attention. In: ACM SIGKDD","DOI":"10.1145\/3292500.3330939"},{"key":"1068_CR31","doi-asserted-by":"crossref","unstructured":"Zhu L, Galstyan A, Cheng J, Lerman K (2014) Tripartite graph clustering for dynamic sentiment analysis on social media. In: Proceedings of ACM SIGMOD","DOI":"10.1145\/2588555.2593682"},{"key":"1068_CR32","unstructured":"Iyer RR, Chen J, Sun H, Xu K (2019) A heterogeneous graphical model to understand user-level sentiments in social media. arXiv:https:\/\/arxiv.org\/abs\/1912.07911"},{"key":"1068_CR33","doi-asserted-by":"crossref","unstructured":"Deng H, Han J, Ji H, Li H, Lu Y, Wang H (2013) Exploring and inferring user-user pseudo-friendship for sentiment analysis with heterogeneous networks. In: Proceedings of SIAM ICDM","DOI":"10.1137\/1.9781611972832.42"},{"key":"1068_CR34","doi-asserted-by":"crossref","unstructured":"Tan C, Lee L, Tang J, Jiang L, Zhou M, Li P (2011) User-level sentiment analysis incorporating social networks. In: Proceedings of ACM SIGKDD","DOI":"10.1145\/2020408.2020614"},{"key":"1068_CR35","doi-asserted-by":"crossref","unstructured":"Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: an underestimated threat. In: Proc ACM CCS","DOI":"10.1145\/2976749.2978339"},{"key":"1068_CR36","doi-asserted-by":"crossref","unstructured":"Liu B, Sun X, Ni Z, Cao J, Luo J, Liu B, Fu X. (2020) Co-Detection of crowdturfing microblogs and spammers in online social networks. In: Proceedings of WWW","DOI":"10.1007\/s11280-019-00727-4"},{"key":"1068_CR37","doi-asserted-by":"crossref","unstructured":"Hu X, Tang J, Gao H, Liu H (2014) Social spammer detection with sentiment information. In: Proceedings of IEEE ICDM","DOI":"10.1109\/ICDM.2014.141"},{"key":"1068_CR38","doi-asserted-by":"crossref","unstructured":"Song Y, Lu Z, Leung CW, Yang Q (2013) Collaborative boosting for activity classification in microblogs. In: Proceedings of ACM SIGKDD","DOI":"10.1145\/2487575.2487661"},{"key":"1068_CR39","doi-asserted-by":"crossref","unstructured":"Ma J, Yang W, Luo M, Li N (2014) A study of probabilistic password models. In: IEEE Symposium on security and privacy","DOI":"10.1109\/SP.2014.50"},{"key":"1068_CR40","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2005) Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of ACM CCS","DOI":"10.1145\/1102120.1102168"},{"key":"1068_CR41","doi-asserted-by":"crossref","unstructured":"Veras R, Collins C, Thorpe J (2014) On semantic patterns of passwords and their security impact. In: Proceedings of NDSS","DOI":"10.14722\/ndss.2014.23103"},{"key":"1068_CR42","doi-asserted-by":"crossref","unstructured":"Han W, Li Z, Yuan L, Xu W (2016) Regional patterns and vulnerability analysis of chinese web passwords. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2015.2490620"},{"key":"1068_CR43","doi-asserted-by":"crossref","unstructured":"Weir M, Aggarwal S, Medeiros B.d., Glodek B. (2009) Password cracking using probabilistic context-free grammars. In: IEEE Symposium on security and privacy","DOI":"10.1109\/SP.2009.8"},{"key":"1068_CR44","doi-asserted-by":"crossref","unstructured":"Dell\u2019Amico M, Michiardi P, Roudier Y (2010) Password strength: an empirical analysis. In: Conference on information communications","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"1068_CR45","doi-asserted-by":"crossref","unstructured":"Ji S, Yang S, Wang T, Liu C, Lee WH, Beyah R (2015) Pars: a uniform and open-source password analysis and research system. In: Proceedings of ACM WSDM","DOI":"10.1145\/2818000.2818018"},{"key":"1068_CR46","doi-asserted-by":"crossref","unstructured":"Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, Lopez J (2012) Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. In: IEEE Symposium on security and privacy","DOI":"10.21236\/ADA570747"},{"key":"1068_CR47","doi-asserted-by":"crossref","unstructured":"Mazurek ML, Komanduri S, Vidas T, Bauer L, Christin N, Cranor LF, Kelley PG, Shay R, Ur B (2013) Measuring password guessability for an entire university. In: Proceedings of ACM CCS","DOI":"10.1145\/2508859.2516726"},{"key":"1068_CR48","unstructured":"Ur B, Kelley PG, Komanduri S, Lee J, Maass M, Mazurek ML, Passaro T, Shay R, Vidas T, Bauer L, Christin N, Cranor LF (2012) How does your password measure up? The effect of strength meters on password creation. In: USENIX Conference on security symposium"},{"key":"1068_CR49","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio D, Herley C (2010) Where do security policies come from?. In: Symposium on usable privacy and security","DOI":"10.1145\/1837110.1837124"},{"key":"1068_CR50","doi-asserted-by":"crossref","unstructured":"Wang D, Wang P (2015) The emperor\u2019s new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing. In: Proceedings of ESORICS","DOI":"10.1007\/978-3-319-24177-7_23"},{"key":"1068_CR51","doi-asserted-by":"crossref","unstructured":"Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of ACM CCS","DOI":"10.1145\/1866307.1866327"},{"key":"1068_CR52","doi-asserted-by":"crossref","unstructured":"Ji S, Yang S, Hu X, Han W, Li Z, Beyah R (2017) Zero-sum password cracking game a large-scale empirical study on the crackability, correlation, and security of passwords. IEEE TDSC","DOI":"10.1109\/TDSC.2015.2481884"},{"key":"1068_CR53","doi-asserted-by":"crossref","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf\u2019s law in passwords. IEEE TIFS.","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"1068_CR54","doi-asserted-by":"crossref","unstructured":"Li Y, Wang H, Sun K (2016) A study of personal information in human-chosen passwords and its security implications. In: Proc. IEEE INFOCOM","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"1068_CR55","unstructured":"Wang D, Wang P, He D, Tian Y (2019) Birthday, name and bifacial-security: understanding passwords of chinese web users. In: Proceedings of USENIX security symposium"},{"key":"1068_CR56","doi-asserted-by":"crossref","unstructured":"Liu L, Jia H (2015) Trust evaluation via large-scale complex service-oriented online social networks. In: IEEE Transactions on systems, man and cybernetics: systems","DOI":"10.1109\/TSMC.2015.2406858"},{"key":"1068_CR57","unstructured":"Bradbury TN, Karney BR (2019) Intimate relationships"},{"key":"1068_CR58","doi-asserted-by":"crossref","unstructured":"Su Z, Wang Y, Xu Q, Zhang N (2020) LVBS: lightweight vehicular blockchain for secure data sharing in disaster rescue. In: IEEE Transactions on dependable and secure computing","DOI":"10.1109\/TDSC.2020.2980255"},{"key":"1068_CR59","doi-asserted-by":"crossref","unstructured":"Pearman S, Thomas J, Naeini PE, Habib H, Bauer L, Christin N, Cranor LF, Egelman S, Forget A (2017) Let\u2019s go in for a closer look: observing passwords in their natural habitat. In: ACM CCS","DOI":"10.1145\/3133956.3133973"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-01068-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-01068-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-01068-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T19:41:01Z","timestamp":1698003661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-01068-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,9]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["1068"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-01068-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,3,9]]},"assertion":[{"value":"31 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}