Method for detecting privacy leak of user based on multi-task learning, server and system

A multi-task learning and user privacy technology, applied in the field of information classification processing, can solve the problems of poor model interpretability, neglect of privacy correlation, etc., and achieve the effect of improving modeling performance

Active Publication Date: 2018-11-16
SHANDONG UNIV
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing techniques are mainly applied to structured data. For unstructured data, effective classifiers are usually trained intensivel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting privacy leak of user based on multi-task learning, server and system
  • Method for detecting privacy leak of user based on multi-task learning, server and system
  • Method for detecting privacy leak of user based on multi-task learning, server and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] It should be noted that the following detailed description is exemplary and intended to provide further explanation of the application. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0044] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural as well, furthermore, it is to be understood that when the terms "comprising" and / or "including" are used in this specification, it indicates that There are features, steps, operations, devices, components and / or combinations thereof.

[0045] figure 1 It is a flowchart of a user privacy leakage detection method based on multi-task learning...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting privacy leak of a user based on multi-task learning, a server and a system. The method for detecting privacy leak of the user based on multi-task learning comprises the following steps: for comprehensive representation of privacy of the user, dividing the privacy of the user into a plurality of fine-grained privacy categories in advance, and dividingthe fine-grained privacy categories into a plurality of groups to form group structural information for privacy of the user; extracting privacy characteristics of the user from different direction torepresent the privacy categories of the user in an all-round manner; constructing a prediction model based on the extracted privacy characteristics of the user; and introducing multi-task learning, enabling each task in the same group to share related characteristics, and performing characteristic grouping by taking the group structural information of the privacy of the user as a priori by use ofa group lasso model. Therefore, the modeling performance for detection of privacy leak of the user and interpretability of the model are improved.

Description

technical field [0001] The invention belongs to the field of information classification processing, and in particular relates to a user privacy leakage detection method, server and system based on multi-task learning. Background technique [0002] With the rapid development of Web2.0, the Internet has entered the era of social media, and social media has become an important platform for people to obtain and share information on a daily basis. As users are increasingly exposed to social media, privacy threats have gradually become an important issue related to the vital interests of every online user. [0003] In recent years, there have been many research works around the detection of user privacy leaks in social media. Existing techniques are mainly applied to structured data. For unstructured data, effective classifiers are usually trained intensively, but they mainly focus on coarse-grained privacy judgments and ignore the correlation of privacy, making the model less in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 宋雪萌陈潇琳程志勇王英龙聂礼强
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products