2023
DOI: 10.1109/jsyst.2022.3197150
|View full text |Cite
|
Sign up to set email alerts
|

Compressed Sensing-Based Privacy Preserving in Labeled Dynamic Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Te evaluation indexes used in this study are precision (P) calculated using formula (18), recall (R) calculated using formula (19), F1 calculated using formula (20), and accuracy (ACC) calculated using formula (21). Te specifc calculation formulas of these evaluation indexes are as follows:…”
Section: Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Te evaluation indexes used in this study are precision (P) calculated using formula (18), recall (R) calculated using formula (19), F1 calculated using formula (20), and accuracy (ACC) calculated using formula (21). Te specifc calculation formulas of these evaluation indexes are as follows:…”
Section: Metricsmentioning
confidence: 99%
“…A number of experts have proposed to analyze privacy in dynamic social networks by using privacy propagation and accumulation [16,17], along with centralized [18] and decentralized technologies [19] for privacy protection. Other researchers have also proposed the use of compressed sensing technology to protect the privacy of dynamic social networks [20]. Although these methods can protect privacy, they cannot meet the specifc needs of individuals.…”
Section: Introductionmentioning
confidence: 99%
“…However, owing to privacy concerns, many users are unwilling to provide their personal information to build social networks. To alleviate the privacy concern of users, many privacy-preserving methods have been developed to prevent the attacker from recognizing a specific user from a social network, such as disturbing the edges in social networks, restricting queries in social networks, and so on [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%