2018
DOI: 10.1016/j.ins.2018.02.031
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing social network privacy with accumulated non-zero prior knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In the experiments, seven networks without node attributes are first generated by using the LFR benchmark, of which parameters are given in Table 2. For the first four networks, four types of attributes are generated by using the LFR-EA, where the attribute ranges are set as [1,5], [1,10], [1,12] and [1,10], and the fluctuating parameter v are set as 0.2, 0.5, 0.2, and 0.5 separately. For the rest two networks, the iris [45] and breast cancer datasets [46] are employed to generate their node attributes, where each record owns four numerical attributes and with classification results.…”
Section: Compared Algorithms and Data Sets 511 Compared Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the experiments, seven networks without node attributes are first generated by using the LFR benchmark, of which parameters are given in Table 2. For the first four networks, four types of attributes are generated by using the LFR-EA, where the attribute ranges are set as [1,5], [1,10], [1,12] and [1,10], and the fluctuating parameter v are set as 0.2, 0.5, 0.2, and 0.5 separately. For the rest two networks, the iris [45] and breast cancer datasets [46] are employed to generate their node attributes, where each record owns four numerical attributes and with classification results.…”
Section: Compared Algorithms and Data Sets 511 Compared Algorithmsmentioning
confidence: 99%
“…However, owing to privacy concerns, many users are unwilling to provide their personal information to build social networks. To alleviate the privacy concern of users, many privacy-preserving methods have been developed to prevent the attacker from recognizing a specific user from a social network, such as disturbing the edges in social networks, restricting queries in social networks, and so on [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…They showed that there was an inherent trade-off between privacy and accuracy when answering a large number of queries. Wang et al [59] formulated the correlated query results as the non-zero prior knowledge and proposed a novel differential privacy approach to enhance privacy of social network data being inferred. The proposed approach was superior to the state-of-the-art privacy-preserving approaches with respect to data privacy and data utility; however, this approach might be not extended to other types of social graph queries.…”
Section: Related Workmentioning
confidence: 99%