“…According to the sampling method, we delete the nodes that do not meet the privacy requirements and Perturbation method Mittal et al [8] , Fard et al [9] Cannot face the attacker with good knowledge background Anonymity method Cheng et al [10] , Ahmed et al [11] , Casas et al [12] , Zheleva et al [13] Cannot face the attacker with good knowledge background Differential privacy method Gao et al [14] , Bichsel et al [15] , Rubinstein et al [16] , Leake et al [17] , Liu et al [18] , Huang et al [19] Cannot provide personalized privacy protection in social network data protection…”