2017
DOI: 10.1007/s00500-017-2513-y
|View full text |Cite
|
Sign up to set email alerts
|

A novel subgraph $$K^{+}$$ K + -isomorphism method in social network based on graph similarity detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(19 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…However, such collaboration will raise privacy concerns that are related to patients' records [Alabdulkarim, Al-Rodhaan and Tian (2017); Liang, Lu, Chen et al (2011); Liu, Lu, Ma et al (2016); Lu, Lin and Shen (2013)]. The privacy of shared data is a serious issue [Ma, Zhang, Cao et al (2015); Rong, Ma, Tang et al (2018); Xiong and Shi (2018)]; thus, privacy preserving algorithms for securing data-mining techniques enable the extraction of hidden patterns from a dataset without actually accessing it [Zhang, Tong, Tang et al (2005)]. A privacy-Preserving naïve Bayes classifier (PPNBC) model was proposed in Liu et al [Liu, Lu, Ma et al (2016)].…”
Section: Introductionmentioning
confidence: 99%
“…However, such collaboration will raise privacy concerns that are related to patients' records [Alabdulkarim, Al-Rodhaan and Tian (2017); Liang, Lu, Chen et al (2011); Liu, Lu, Ma et al (2016); Lu, Lin and Shen (2013)]. The privacy of shared data is a serious issue [Ma, Zhang, Cao et al (2015); Rong, Ma, Tang et al (2018); Xiong and Shi (2018)]; thus, privacy preserving algorithms for securing data-mining techniques enable the extraction of hidden patterns from a dataset without actually accessing it [Zhang, Tong, Tang et al (2005)]. A privacy-Preserving naïve Bayes classifier (PPNBC) model was proposed in Liu et al [Liu, Lu, Ma et al (2016)].…”
Section: Introductionmentioning
confidence: 99%
“…When k-anonymity method is used to protect the privacy of users in the above query, if the anonymous region generated by the anonymous server is too large, the querying cost of the location-based service provider (LSP) will increase and the service quality deteriorates [17][18][19]. To solve this problem, the existing methods [20][21][22][23][24][25][26] obtain n disjoint anonymous subregions by removing the part that does not contain the users in the regions, to reduce the area of anonymous regions and improve the service quality as shown in Figure 1. However, the quality of service in LBS queries based on k-anonymity is not only related to the size of the anonymous regions but also to the user's query range.…”
Section: Introductionmentioning
confidence: 99%
“…Deng W et al [28] investigated an improved adaptive particle swarm optimization(DOADAPO) algorithm based on making full use of the advantages of Alpha-stable distribution and dynamic fractional calculus. Rong H. et al [29] proposed a novel K + -isomorphism method and an improved MPD-V method. In addition, in order to accomplish the complex tasks, some current techniques are combined with the K +isomorphism method.…”
Section: Introductionmentioning
confidence: 99%