Graph convolutional network gradient-based node information hiding method

A technology of convolutional network and node information, applied in biological neural network models, digital data protection, computer security devices, etc., can solve problems such as target user information protection, user information leakage, etc.

Pending Publication Date: 2018-10-12
ZHEJIANG UNIV OF TECH
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the deepening of information mining, many scholars have found that information security is also a very important issue. Excessive collection and mining of user information will cause user information leakage, especially the information protection of target users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Graph convolutional network gradient-based node information hiding method
  • Graph convolutional network gradient-based node information hiding method
  • Graph convolutional network gradient-based node information hiding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0050] In this embodiment, the Citeseer data set is selected as the experimental data set of this embodiment. Specifically, the process of hiding node information is divided into two stages, as follows: figure 1 Computational stages of the edge-connected gradient matrix shown and as figure 2 Gradient update phase of the adjacency matrix shown. The specific processes of the two stages are described below.

[0051] The specific process of the calculation phase of the edge gradient matrix is ​​as follows:

[0052] S101, establish a network graph according to the Citeseer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a graph convolutional network gradient-based node information hiding method. The method comprises the steps of (1) constructing a network graph, constructing an adjacent matrixaccording to a connected edge set corresponding to the network graph, and preprocessing the adjacent matrix; (2) constructing and training a graph convolutional network model, and determining final weight information of the graph convolutional network model; (3) according to the final weight information, building an objective function based on a goal of ensuring non-target node classification tobe accurate as far as possible and enabling target node classification to be wrong, and calculating a connected edge gradient matrix corresponding to the adjacent matrix by utilizing the objective function; (4) according to a set gradient threshold, symbolizing the connected edge gradient matrix to obtain a connected edge gradient symbol matrix; and (5) updating the adjacent matrix by utilizing the connected edge gradient symbol matrix to hide node information. According to the method, the target node information of a network can be hidden under the condition of slightly changing the structureof the network as far as possible.

Description

technical field [0001] The invention belongs to the technical field of deep learning security, and in particular relates to a node information hiding method based on graph convolution network gradients. Background technique [0002] With the rapid development of science and technology, people use the Internet to browse, shop and other behaviors are becoming more and more common. In the era of artificial intelligence, the behavior and habits of the masses will serve as an important source of information, and various hidden information of the masses can be extracted after in-depth information processing. On the one hand, the extracted hidden information can provide richer and more detailed materials for the academic field and promote the development of academics; on the other hand, the extracted hidden information can improve the service effect of service objects such as stores to the masses. [0003] However, with the deepening of information mining, many scholars have found...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q50/00G06F21/60G06K9/62G06N3/04
CPCG06F21/604G06Q50/01G06N3/045G06F18/241
Inventor 陈晋音吴洋洋徐轩桁施朝霞
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products