Affiliation:
1. School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, China
2. School of Cyber Engineering, Xidian University, Xi’an, China
Abstract
With the increasing severity of user privacy leaks in online social networks (OSNs), existing privacy protection technologies have difficulty meeting the diverse privacy protection needs of users. Therefore, privacy-aware (PA) for the text data that users post on OSNs has become a current research focus. However, most existing PA algorithms for OSN users only provide the types of privacy disclosures rather than the specific locations of disclosures. Furthermore, although named entity recognition (NER) technology can extract specific locations of privacy text, it has poor recognition performance for nested and interest privacy. To address these issues, this paper proposes a PA framework based on the extraction of OSN privacy information content. The framework can automatically perceive the privacy information shared by users in OSNs and accurately locate which parts of the text are leaking sensitive information. Firstly, we combine the roformerBERT model, BI_LSTM model, and global_pointer algorithm to construct a direct privacy entity recognition (DPER) model for solving the specific privacy location recognition and entity nesting problems. Secondly, we use the roformerBERT model and UniLM framework to construct an interest privacy inference (IPI) model for interest recognition and to generate interpretable text that supports this interest. Finally, we constructed a dataset of 13,000 privacy-containing texts for experimentation. Experimental results show that the overall accuracy of the DPER model can reach 91.80%, while that of the IPI model can reach 98.3%. Simultaneously, we compare the proposed model with recent methods. The analysis of the results indicates that the proposed model exhibits better performance than previous methods.
Funder
National Natural Science Foundation of China
Subject
Artificial Intelligence,Human-Computer Interaction,Theoretical Computer Science,Software
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献