2019
DOI: 10.1109/access.2019.2946179
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Recently, due to availability of the excessive amount of auxiliary information and advanced data mining tools, the scale and the scope of privacy breaches is expanding from an individual identification or SA disclosure to groups identity theft for achieving multiple scientific and business objectives, and identifying communities in SNs having common characteristics or common interests for accurate recommendations. Yin et al [172], Li et al [173], Mao et al [174], Zhang et al [175], [176] 2. user-generated contents in SN measuring similarities of contents in terms of space, time and content dimensions, interest mapping, word embedding technologies on users messages.…”
Section: B De-anonymization Methods Employed By the Adversaries To Jmentioning
confidence: 99%
“…Recently, due to availability of the excessive amount of auxiliary information and advanced data mining tools, the scale and the scope of privacy breaches is expanding from an individual identification or SA disclosure to groups identity theft for achieving multiple scientific and business objectives, and identifying communities in SNs having common characteristics or common interests for accurate recommendations. Yin et al [172], Li et al [173], Mao et al [174], Zhang et al [175], [176] 2. user-generated contents in SN measuring similarities of contents in terms of space, time and content dimensions, interest mapping, word embedding technologies on users messages.…”
Section: B De-anonymization Methods Employed By the Adversaries To Jmentioning
confidence: 99%
“…J Mao et al proposed a relatedness attribute inference method based on relevance attribute inference method (ReAI), which used social relevance attribute network (SRAN) graph-based random walk and restart to find the user's "nearest" attribute node through multi-source data such as the correlation between attributes and social connections [45]. N Z Gong et al combined user attributes, social graph and behaviour to build an enhanced network of social behaviour attribute (SBA), integrated social structure, user behaviour and user attributes into a unified framework [46].…”
Section: Multi Source-based Approachesmentioning
confidence: 99%
“…The cloud data center server and fog access servers only provides data storage, forwarding and synchronization services. 2 They do not interfere with edge computing communications between edge devices. Edge devices can transmit messages with each other directly using unlicensed frequency bands or forward messages by a fog access server for communications without directly reachable.…”
Section: Overview a System Modelmentioning
confidence: 99%
“…A cyber-physical-social system (CPSS) is a multidimensional intelligent system. After mining social relationships behind big data, it can exploit social attributes to control a traditional cyber-physical system [1], [2]. Integrated with the rapidly developing computing-communicationcontrol technologies, CPSSs can realize real-time sensing [3], dynamic control [4], and information services [5], which can be expected to revolutionize our industrial paradigm [6] and improve the quality of human life [7].…”
Section: Introductionmentioning
confidence: 99%