Open Access iconOpen Access

REVIEW

crossmark

From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods

Shaojie Min1, Yaxiao Luo1, Kebing Liu1, Qingyuan Gong2, Yang Chen1,*

1 Shanghai Key Lab of Intelligent Information Processing, College of Computer Science and Artificial Intelligence, Fudan University, Shanghai, 200433, China
2 Research Institute of Intelligent Complex Systems, Fudan University, Shanghai, 200433, China

* Corresponding Author: Yang Chen. Email: email

(This article belongs to the Special Issue: Cyberspace Mapping and Anti-Mapping Techniques)

Computers, Materials & Continua 2026, 86(2), 1-23. https://doi.org/10.32604/cmc.2025.073175

Abstract

User identity linkage (UIL) across online social networks seeks to match accounts belonging to the same real-world individual. This cross-platform mapping enables accurate user modeling but also raises serious privacy risks. Over the past decade, the research community has developed a wide range of UIL methods, from structural embeddings to multimodal fusion architectures. However, corresponding adversarial and defensive approaches remain fragmented and comparatively understudied. In this survey, we provide a unified overview of both mapping and anti-mapping methods for UIL. We categorize representative mapping models by learning paradigm and data modality, and systematically compare them with emerging countermeasures including adversarial injection, structural perturbation, and identity obfuscation. To bridge these two threads, we introduce a modality-oriented taxonomy and a formal game-theoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers. This framing allows us to construct a cross-modality dependency matrix, which reveals structural information as the most contested signal, identifies node injection as the most robust defensive strategy, and points to multimodal integration as a promising direction. Our survey underscores the need for balanced, privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.

Keywords

User identity linkage (UIL); cross-network mapping; adversarial attacks; privacy protection; online social networks

Cite This Article

APA Style
Min, S., Luo, Y., Liu, K., Gong, Q., Chen, Y. (2026). From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods. Computers, Materials & Continua, 86(2), 1–23. https://doi.org/10.32604/cmc.2025.073175
Vancouver Style
Min S, Luo Y, Liu K, Gong Q, Chen Y. From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods. Comput Mater Contin. 2026;86(2):1–23. https://doi.org/10.32604/cmc.2025.073175
IEEE Style
S. Min, Y. Luo, K. Liu, Q. Gong, and Y. Chen, “From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods,” Comput. Mater. Contin., vol. 86, no. 2, pp. 1–23, 2026. https://doi.org/10.32604/cmc.2025.073175



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 557

    View

  • 189

    Download

  • 0

    Like

Share Link