IEEE Systems, Man and Cybernetics Magazine - October 2022 - 45

although various algorithms explore the best solution to
maximize influence from different angles, they ignore the
privacy protection problem in communication [5], [6], [7],
[8], [9]. User privacy is the most common information carrier
for social networks, and influence dissemination
schemes lacking privacy protection measures are challenging
to directly apply to the actual environment. Therefore,
in this article, aiming at the reasons why the existing information
dissemination models cannot well model the leakage
of user privacy and the problem that related research
is challenging to balance the needs of user privacy protection
and information dissemination, this work researches
social network information dissemination methods that
support privacy protection [10], [11], [12]. It helps to maximize
the dissemination of information influence while protecting
user privacy. The main applications of this method
are as follows (see Figure 1):
1) For individual users: Only the blocked users are specified
when publishing information. Therefore, the algorithm
can automatically give the push objects of the data
so that the information will not leak to the blocked users.
2) For merchants: By setting non-target users as block
lists, algorithms can find out which users in the social
network are more valuable for advertising and push
them accurately.
that people trusted by users only access user information,
it is necessary to implement information access control
between user nodes for privacy protection. The authors in
[1] designed a centralized social network model that supports
high availability and real-time content dissemination
and decides users' privacy by learning their social behaviors.
The authors in [2] proposed online social network
architecture Lotus Net based on a distributed hash table
which controls private resources through a flexible and
fine-grained autonomous access control unit, making it
easier for users to adjust their privacy settings. In practice,
however, neither centralized nor distributed solutions can
protect pervasive social network communications as
expected. To this end, a kind of access control scheme
based on 2D trust degree is proposed [3], [4], which calculates
the 2D trust degree between nodes by using information
node attributes and implements access control to user
privacy according to 2D trust degree. To summarize, in the
existing information dissemination prediction research,
researchers have not considered the possibility of using
paraphrasing as an information dissemination method,
which will cause the omission of the dissemination path
when tracing the source of disseminated information, as
that in information dissemination modeling. Leaks of private
information cannot be captured when a paraphrase
occurs. In the research of influence maximization,
Methods of Constructing Communication
Networks to Support Retelling Behaviors
For new information to be released by users, to maximize
the influence of information dissemination while satisfying
the preset privacy protection constraints, it is necessary
to predict the information dissemination process
based on the social network dissemination model. The
social network propagation model relies on the probability
distribution of user behavior, so it is necessary to build a
propagation network of published information to train a
user behavior classifier.
Method Overview
Problem Definition
The difficulty of building a communication network is that
there are only two types of user behaviors obtained from
1
2
3
4
5
6
Figure 1. The process of information communication
based on the model of social network communication.
October 2022 IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE 45
7
©SHUTTERSTOCK.COM/RAWPIXEL.COM
http://www.SHUTTERSTOCK.COM/RAWPIXEL.COM

IEEE Systems, Man and Cybernetics Magazine - October 2022

Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - October 2022

Contents
IEEE Systems, Man and Cybernetics Magazine - October 2022 - Cover1
IEEE Systems, Man and Cybernetics Magazine - October 2022 - Cover2
IEEE Systems, Man and Cybernetics Magazine - October 2022 - Contents
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 2
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 3
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 4
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 5
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 6
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 7
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 8
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 9
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 10
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 11
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 12
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 13
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 14
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 15
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 16
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 17
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 18
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 19
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 20
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 21
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 22
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 23
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 24
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 25
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 26
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 27
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 28
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 29
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 30
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 31
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 32
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 33
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 34
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 35
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 36
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 37
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 38
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 39
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 40
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 41
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 42
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 43
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 44
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 45
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 46
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 47
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 48
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 49
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 50
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 51
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 52
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 53
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 54
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 55
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 56
IEEE Systems, Man and Cybernetics Magazine - October 2022 - 57
IEEE Systems, Man and Cybernetics Magazine - October 2022 - Cover3
IEEE Systems, Man and Cybernetics Magazine - October 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202310
https://www.nxtbook.com/nxtbooks/ieee/smc_202307
https://www.nxtbook.com/nxtbooks/ieee/smc_202304
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com