2017
DOI: 10.1007/s11042-017-5502-3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation based on clustering perturbation algorithm for social network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Then they replace the subgraph, which contains similar nodes into a cluster, by a super node. Also, in [30], Yu et al propose a clustering algorithm to preserve privacy for social network. The proposed algorithm ensures the privacy of nodes attributes values and community structures simultaneously.…”
Section: Related Workmentioning
confidence: 99%
“…Then they replace the subgraph, which contains similar nodes into a cluster, by a super node. Also, in [30], Yu et al propose a clustering algorithm to preserve privacy for social network. The proposed algorithm ensures the privacy of nodes attributes values and community structures simultaneously.…”
Section: Related Workmentioning
confidence: 99%
“…The basic idea of -anonymity is to remove some features so that each item is not distinguishable among other items. For data protection, it protects data at the cost of the original data quality [9]. For location-based services (typical social applications), it realizes the privacy protection through blurring user's locations [7,8,21].…”
Section: Related Workmentioning
confidence: 99%
“…Based on the -anonymity, a clustering perturbation algorithm for privacy protection in social networks was proposed [9]. It considers preserving privacy of vertex properties and community structures simultaneously.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Various privacy protection methods have been proposed aiming at protecting these two types of privacy objects. For example, regarding the privacy of vertex attributes, data generalization [1][2][3][4] or perturbation methods [5][6][7] are usually adopted to protect personal identity or sensitive attributes such as name, phone number, address, etc from disclosure. On the other hand, for the privacy of the relational data [8], it has already become one of the research hotspots that needs to be explored more intensively.…”
Section: Introductionmentioning
confidence: 99%