2022
DOI: 10.1142/s0218126622501602
|View full text |Cite
|
Sign up to set email alerts
|

Locality-Sensitive Hashing-Based Link Prediction Process on Smart Campus Education or Online Social Platform

Abstract: With the development of the Internet, smart campus education and online social platforms have become the mainstream of establishing social relationships. Although many users communicate by social networks, the social networks are caught in the problem of relationship sparsity, which severely impedes users’ communication space. More fatally, in the course of building social relationships, the disclosure of sensitive information will cause users’ privacy vulnerable to be compromised by attackers. Therefore, this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 37 publications
0
13
0
Order By: Relevance
“…erefore, more refinements are needed in the future. Second, readers' paper search is often a multiobjective decision-making problem that involves a number of influencing factors [47][48][49][50][51][52][53][54] in the mobile edge computing environment. We will further improve our proposal by considering these factors.…”
Section: Discussionmentioning
confidence: 99%
“…erefore, more refinements are needed in the future. Second, readers' paper search is often a multiobjective decision-making problem that involves a number of influencing factors [47][48][49][50][51][52][53][54] in the mobile edge computing environment. We will further improve our proposal by considering these factors.…”
Section: Discussionmentioning
confidence: 99%
“…To accurately predict social relationships, some relationship prediction methods overlook users' requirements to prevent disclosure of sensitive information (e.g., age, preference, address, sex, and so on). Currently, some encryption technologies, [37][38][39][40][41][42] for example, anonymity and locality-sensitive hashing (LSH) methods, are studied and applied to protect the users' sensitive information. 43 In Reference 44, the author adopted micro-aggregation technology to implement K-anonymity of data information to protect user privacy, primarily because K-anonymity could partially hide users' sensitive identity information.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…(4) SHLP: 23 Without considering time factors, the SHLP mainly employs the Simhash technique and the social balance theory to build social relationships and relationship types among users. (5) SRP-LSH: 39 Regardless of time factors, the SRP-LSH primarily takes advantage of the users' behavior data and social network structure information to predict social relationships and relationship types between users. Finally, the approach applies the social balance theory to test prediction results.…”
Section: Precisionmentioning
confidence: 99%
See 2 more Smart Citations