Techno-Societal 2020 2021
DOI: 10.1007/978-3-030-69921-5_73
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining Techniques for Privacy Preservation in Social Network Sites Using SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…We summarize and compare the famous AI-based G anonymization techniques used for PPGP in Table 6. [175] Technical Predicts the SI in a G using ML and suggests how to safeguard it NB, SVM, RF S Yin et al [176] Technical Strikes a balance between privacy and utility in distributing G k-means algorithm R Wang et al [177] Technical Privacy preservation of degree information in releasing G k-means algorithm R Ju et al [178] Technical Strong privacy of V in G along with higher accuracy and utility k-means algorithm R Zheng et al [179] Technical Strong privacy of V in G and fewer changes to G's structure GNN algorithm R Paul et al [180] Technical Preserves the structural properties of G in anonymization process k-means algorithm R Hoang et al [181] Technical Preserves the privacy of SN users modelled via knowledge of G k-ad algorithm R Hoang et al [182] Technical Preserves the privacy of SN users when G is subject to multiple releases CTKGA algorithm R Chen et al [183] Technical Privacy preservation of SN users when G contains outliers and categorical attributes DBSCAN clustering R Narula et al [184] Technical Privacy preservation of identity and emotion-related information in OSN data CNN algorithm R Zitouni et al [185] Technical Privacy preservation by concealing the identity in image data CNN and LSTM R Ahmed et al [186] Technical Privacy preservation by concealing the identity and other SI in images Neural Network R Matheswaran et al [187] Technical Privacy preservation of image data in retrieval and storage in clouds Watermarking R Li et al [188] Technical Both anonymity-and utility-preserving solutions for OSN data GAN Algorithm R Lu et al [189] Technical Privacy preservation by reducing the prediction accuracy of sensitive links in G VGAE and ARVGA R Li et al [190] Technical Privacy preservation using profile, graph structure, and behavioral information GCNN algorithm R Wanda et al [191] Technical Privacy preservation of vulnerable nodes in G using dynamic deep learning CNN architecture R Li et al [192] Technical Privacy preservation of users when a user's job/education-place changes with time Supervised ML R Bioglio et al [193] Technical Privacy preservation of contents in OSN platforms based on sensitivity analysis Deep NN R Hermansson et al [194] Technical Preserves better accuracy for data-mining and analytical tasks from G SVM algorithm R Kalunge et al [195] Technical Preserves better utility (path length and IL) ...…”
Section: Artificial Intelligence-based Graph Anonymization Methodsmentioning
confidence: 99%
“…We summarize and compare the famous AI-based G anonymization techniques used for PPGP in Table 6. [175] Technical Predicts the SI in a G using ML and suggests how to safeguard it NB, SVM, RF S Yin et al [176] Technical Strikes a balance between privacy and utility in distributing G k-means algorithm R Wang et al [177] Technical Privacy preservation of degree information in releasing G k-means algorithm R Ju et al [178] Technical Strong privacy of V in G along with higher accuracy and utility k-means algorithm R Zheng et al [179] Technical Strong privacy of V in G and fewer changes to G's structure GNN algorithm R Paul et al [180] Technical Preserves the structural properties of G in anonymization process k-means algorithm R Hoang et al [181] Technical Preserves the privacy of SN users modelled via knowledge of G k-ad algorithm R Hoang et al [182] Technical Preserves the privacy of SN users when G is subject to multiple releases CTKGA algorithm R Chen et al [183] Technical Privacy preservation of SN users when G contains outliers and categorical attributes DBSCAN clustering R Narula et al [184] Technical Privacy preservation of identity and emotion-related information in OSN data CNN algorithm R Zitouni et al [185] Technical Privacy preservation by concealing the identity in image data CNN and LSTM R Ahmed et al [186] Technical Privacy preservation by concealing the identity and other SI in images Neural Network R Matheswaran et al [187] Technical Privacy preservation of image data in retrieval and storage in clouds Watermarking R Li et al [188] Technical Both anonymity-and utility-preserving solutions for OSN data GAN Algorithm R Lu et al [189] Technical Privacy preservation by reducing the prediction accuracy of sensitive links in G VGAE and ARVGA R Li et al [190] Technical Privacy preservation using profile, graph structure, and behavioral information GCNN algorithm R Wanda et al [191] Technical Privacy preservation of vulnerable nodes in G using dynamic deep learning CNN architecture R Li et al [192] Technical Privacy preservation of users when a user's job/education-place changes with time Supervised ML R Bioglio et al [193] Technical Privacy preservation of contents in OSN platforms based on sensitivity analysis Deep NN R Hermansson et al [194] Technical Preserves better accuracy for data-mining and analytical tasks from G SVM algorithm R Kalunge et al [195] Technical Preserves better utility (path length and IL) ...…”
Section: Artificial Intelligence-based Graph Anonymization Methodsmentioning
confidence: 99%
“…V. Kalunge et al in the study [5] proposed data mining techniques to maintain the privacy of persons on social networking sites using a support vector machine (SVM). In their proposed scheme, privacy protection based on anonymity is performed by sending data to cuckoo search (CS) for optimization and grouping with an SVM algorithm.…”
Section: Simple Graph Uncertain Graph Labeled Graph Bipartite Graphmentioning
confidence: 99%