2019
DOI: 10.1016/j.ins.2018.09.023
|View full text |Cite
|
Sign up to set email alerts
|

On analyzing and evaluating privacy measures for social networks under active attack

Abstract: Widespread usage of complex interconnected social networks such as Facebook, Twitter and LinkedIn in modern internet era has also unfortunately opened the door for privacy violation of users of such networks by malicious entities. In this article we investigate, both theoretically and empirically, privacy violation measures of large networks under active attacks that was recently introduced in (Information Sciences, 328, 403-417, 2016). Our theoretical result indicates that the network manager responsible for … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
22
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(23 citation statements)
references
References 53 publications
1
22
0
Order By: Relevance
“…In [18], DasGupta et al investigated the resistance of 8 real-world network against active attacks with respect to the k, ℓ ðÞ -anonymity. All the networks under investigation were unweighted graphs and the direction of edges (if the network was directed) was ignored during the analysis.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [18], DasGupta et al investigated the resistance of 8 real-world network against active attacks with respect to the k, ℓ ðÞ -anonymity. All the networks under investigation were unweighted graphs and the direction of edges (if the network was directed) was ignored during the analysis.…”
Section: Resultsmentioning
confidence: 99%
“…Results for both ADIM and ADIM ≥ k were obtained by running Algorithm 1 on the networks, the return statements from Algorithm 1 being an exact solution to Problem 2. On the other hand, the exact solution for Problem 1 can be achieved by combining Algorithm 1 and binary search on k to find the largest value of k such that V ≥ k opt 6 ¼ Ø [18].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Privacy violation properties of eight real social networks and large number of synthetic networks generated by both the classical Erdös-Rényi model and the Barbábasi-Albert preferential-attachment model were analyzed in [4];…”
Section: Definition 13 ([8])mentioning
confidence: 99%
“…For example, wheel graphs studied in [1] are n-metric antidimensional, but for 4 ≤ l ≤ n − 1 there are no l-antiresolving sets in wheel graphs. Therefore, as mentioned and presented in [2,4], it is an interesting problem to find families of graphs for which there exist l-antiresolving sets for all values of l, such that 2 ≤ l ≤ k − 1. In the next two sections we show that GP(n, 1) and GP(n, 2) satisfy the previous property.…”
Section: Definition 13 ([8])mentioning
confidence: 99%