2022
DOI: 10.1109/access.2022.3144084
|View full text |Cite
|
Sign up to set email alerts
|

Differential Privacy in Social Networks Using Multi-Armed Bandit

Abstract: There has been an exponential growth over the years in the number of users connected to social networks. This has spurred research interest in social networks to ensure the privacy of users. From a theoretical standpoint, a social network is modeled as a directed graph network and interactions among agents in the directed graph network can be analyzed with non-Bayesian learning and online learning strategies. The goal of the agents is to learn the underlying time-varying true state of the network through repea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Differential privacy (DP) has become a central part of the privacy domain, and it has been extensively investigated in the graph data publishing field [128,129]. DP, in the SN data privacy context, can be defined in simple words as follows.…”
Section: Differential Privacy-based Graph Anonymization Methodsmentioning
confidence: 99%
“…Differential privacy (DP) has become a central part of the privacy domain, and it has been extensively investigated in the graph data publishing field [128,129]. DP, in the SN data privacy context, can be defined in simple words as follows.…”
Section: Differential Privacy-based Graph Anonymization Methodsmentioning
confidence: 99%
“…Finally, due to robust privacy guarantees, DP has been extensively used in AI environments to preserve the privacy and utility of individuals [83][84][85][86][87]. In the coming years, DP will be an integral part of many emerging technologies with regard to privacy preservation [88]. Furthermore, it is one of the most widely used techniques in the cloud, edge, and fog computing environments for privacy preservation against active attackers [89][90][91].…”
Section: Individual Privacy Preservation and Sota Approaches In Track Bmentioning
confidence: 99%