2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020
DOI: 10.1109/trustcom50675.2020.00115
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…1,13 Constraint modification-based methods perturb the structure of the original graph with nodes or links addition/deletion while meeting certain constraints. 12,31,32 Random perturbation-based techniques randomly add/remove or switch nodes and links to preserve user privacy. 33 Random walk-based methods add noise to target links by random walk.…”
Section: Privacy-preserving Graph Publishing (Ppgp)mentioning
confidence: 99%
See 3 more Smart Citations
“…1,13 Constraint modification-based methods perturb the structure of the original graph with nodes or links addition/deletion while meeting certain constraints. 12,31,32 Random perturbation-based techniques randomly add/remove or switch nodes and links to preserve user privacy. 33 Random walk-based methods add noise to target links by random walk.…”
Section: Privacy-preserving Graph Publishing (Ppgp)mentioning
confidence: 99%
“…And the value K is set to 8, which is the same as the study. 32 Privacy Encoding (PE) 12 : PE is designed to defend against privacy inference attacks. For SN data, the model provides two levels of privacy protection.…”
Section: Baseline Modelsmentioning
confidence: 99%
See 2 more Smart Citations