2016
DOI: 10.17485/ijst/2016/v9i12/81982
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Approach of Published Social Networks Data with Vertex and Edge Modification Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…K-anonymous makes at least k records have the same quasi identifier by generalization or clustering. If k records in the data set have the same quasi-identifier, the attacker has only 1/k probability to guess out the correct result [32]. The method is easy to implement, and the leakage risk is measurable, so it is widely used [26].…”
Section: Introductionmentioning
confidence: 99%
“…K-anonymous makes at least k records have the same quasi identifier by generalization or clustering. If k records in the data set have the same quasi-identifier, the attacker has only 1/k probability to guess out the correct result [32]. The method is easy to implement, and the leakage risk is measurable, so it is widely used [26].…”
Section: Introductionmentioning
confidence: 99%
“…In [6] described a method to preserve the privacy of the published data by modifying the graph by adding a small number of edges. This method provided the quantitative value of lost information due to the generalization of the labels.…”
Section: Introductionmentioning
confidence: 99%