2020
DOI: 10.1016/j.neucom.2018.11.104
|View full text |Cite
|
Sign up to set email alerts
|

Local differential privacy for social network publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 9 publications
0
20
0
Order By: Relevance
“…k-anonymity [10], ℓ-diversity [11], tcloseness [12], slicing [13], anatomy [14], and their improved versions are well known relational anonymization techniques. Random walk [15], differential privacy [16], cluster based techniques [17], k-anonymity based techniques [18,19], edge editing [20], k-degree anonymization [21], k-neighbourhood anonymization [22], k-isomorphism anonymization [23], kautomorphism anonymization [24], edge differential privacy [25], node differential privacy [26], vertex degree distribution and attribute value distribution [27,28], and uncertainty semantics [29] are the most widely used structural anonymization techniques.…”
Section: Introductionmentioning
confidence: 99%
“…k-anonymity [10], ℓ-diversity [11], tcloseness [12], slicing [13], anatomy [14], and their improved versions are well known relational anonymization techniques. Random walk [15], differential privacy [16], cluster based techniques [17], k-anonymity based techniques [18,19], edge editing [20], k-degree anonymization [21], k-neighbourhood anonymization [22], k-isomorphism anonymization [23], kautomorphism anonymization [24], edge differential privacy [25], node differential privacy [26], vertex degree distribution and attribute value distribution [27,28], and uncertainty semantics [29] are the most widely used structural anonymization techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Zhang et al [ 188 ] adopted the idea of multi-party computation clustering to generate a graph model under the optimized RR algorithm. Besides, Liu et al [ 189 ] used the perturbed local communities to generate a synthetic network that maintains the original structural information.…”
Section: Applicationsmentioning
confidence: 99%
“…where x i ∈ R 100 is an input vector, x i ∼ N (0, Σ), covariance matrix Σ = 0.5 |i−j| , 1 ≤ i, j ≤ n, coefficient vector w ∈ R 100 , where w(1 : 8) = (10,9,8,7,6,5,4, 0.5) , and w(9 : 100) = (0, 0, ..., 0). is standardized normal random error, and sample number n. If p(y i = 1|x i ) ≥ 0.5, let y i = 1, else, y i = −1.…”
Section: Simulationmentioning
confidence: 99%
“…As a privacy-preserving technology with rigorous mathematical theory, differential privacy is suitable for privacy preserving in the era of big data, and has a broad application [8][9][10][11]. In the framework of differential privacy, the degree of privacy information leakage is controlled by the parameter .…”
Section: Introductionmentioning
confidence: 99%