2017
DOI: 10.1007/s10766-017-0546-6
|View full text |Cite
|
Sign up to set email alerts
|

Against Signed Graph Deanonymization Attacks on Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Therefore, we plan to explore incentive mechanisms to encourage idle UEs to participate in outband D2D relaying services. In addition, the research combining incentive mechanism with the social awareness method [53] and the trust mechanism for throughput improvement is also an interesting future direction.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, we plan to explore incentive mechanisms to encourage idle UEs to participate in outband D2D relaying services. In addition, the research combining incentive mechanism with the social awareness method [53] and the trust mechanism for throughput improvement is also an interesting future direction.…”
Section: Discussionmentioning
confidence: 99%
“…All the sensor node has the same effective transmission radius . The same as most networks, the shortest routing protocol is used [23]. The nodes with the same number of hops from the sink node are in the same tier, so that the network can be divided into ⌈ / ⌉ tiers of the same width (0 < ≤ ).…”
Section: The Network Modelmentioning
confidence: 99%
“…However, because of the volatility of the wireless communication in network, the data packets in the wireless communication have a certain loss rate, which leads to the loss of each transmission of the data packets. This greatly reduces the probability of a node that is far from the sink node sending a packet to reach a sink node through multihop communication [23,24]. Therefore, how to ensure reliable data collection in wireless sensor networks is also a challenging issue.…”
Section: Introductionmentioning
confidence: 99%
“…In big data era [23], graph computing is widely used in different fields such as social networks [24], sensor networks [25,26], internet-of-things [27,28], and cellular networks [29]. Therefore, there is urgent demand for improving the performance of big graph processing, especially graph pattern matching.…”
Section: Related Workmentioning
confidence: 99%