2016 16th International Symposium on Communications and Information Technologies (ISCIT) 2016
DOI: 10.1109/iscit.2016.7751622
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation based on rotation perturbation in weighted social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…While the input perturbation uses one of the additive noise or multiplicative noise methods, the noise addition and rule hiding approaches [14][15][16] are applied together in output perturbation [17]. Input perturbation; can be applied one dimensional with additive perturbation [18,19], random response [20] and swapping [21][22][23][24], while condensation [25], random rotation [26][27][28][29][30], random projection [31] and geometric perturbation [32], can be applied multi-dimensionally.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…While the input perturbation uses one of the additive noise or multiplicative noise methods, the noise addition and rule hiding approaches [14][15][16] are applied together in output perturbation [17]. Input perturbation; can be applied one dimensional with additive perturbation [18,19], random response [20] and swapping [21][22][23][24], while condensation [25], random rotation [26][27][28][29][30], random projection [31] and geometric perturbation [32], can be applied multi-dimensionally.…”
Section: Literature Reviewsmentioning
confidence: 99%