User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy ris...User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.展开更多
基金funded by the National Key R&D Program of China under Grant(No.2022YFB3102901)National Natural Science Foundation of China(Nos.62072115,62102094)Shanghai Science and Technology Innovation Action Plan Project(No.22510713600).
文摘User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.