Social-Sensor Identity Cloning Detection Using Weakly Supervised Deep Forest and Cryptographic Authentication
Alharbi, Ahmed, Dong, Hai, Yi, Xun
–arXiv.org Artificial Intelligence
Recent years have witnessed a rising trend in social-sensor cloud identity cloning incidents. However, existing approaches suffer from unsatisfactory performance, a lack of solutions for detecting duplicated accounts, and a lack of large-scale evaluations on real-world datasets. We introduce a novel method for detecting identity cloning in social-sensor cloud service providers. Our proposed technique consists of two primary components: 1) a similar identity detection method and 2) a cryptography-based authentication protocol. Initially, we developed a weakly supervised deep forest model to identify similar identities using non-privacy-sensitive user profile features provided by the service. Subsequently, we designed a cryptography-based authentication protocol to verify whether similar identities were generated by the same provider. Our extensive experiments on a large real-world dataset demonstrate the feasibility and superior performance of our technique compared to current state-of-the-art identity clone detection methods.
arXiv.org Artificial Intelligence
Aug-14-2025
- Country:
- Asia
- Middle East > Saudi Arabia
- Medina Province > Medina (0.04)
- Russia (0.14)
- Middle East > Saudi Arabia
- Oceania > Australia
- Asia
- Genre:
- Research Report
- New Finding (0.46)
- Promising Solution (0.34)
- Research Report
- Industry:
- Information Technology
- Security & Privacy (1.00)
- Services (1.00)
- Information Technology
- Technology:
- Information Technology
- Artificial Intelligence
- Machine Learning
- Neural Networks > Deep Learning (1.00)
- Statistical Learning (1.00)
- Natural Language > Information Retrieval (0.68)
- Representation & Reasoning (0.68)
- Machine Learning
- Communications > Social Media (1.00)
- Data Science > Data Mining (0.68)
- Security & Privacy (1.00)
- Artificial Intelligence
- Information Technology