Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2013
DOI: 10.1109/tkde.2011.259
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Sensitive Labels in Social Network Data Anonymization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
86
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(89 citation statements)
references
References 25 publications
2
86
0
1
Order By: Relevance
“…However, there are various privacy preserving techniques (i.e. anonymization techniques and data perturbation techniques) have been well studied in literature to preserve the privacy of individuals in the data sets ( [29]- [31] and references there in).…”
Section: Related Workmentioning
confidence: 99%
“…However, there are various privacy preserving techniques (i.e. anonymization techniques and data perturbation techniques) have been well studied in literature to preserve the privacy of individuals in the data sets ( [29]- [31] and references there in).…”
Section: Related Workmentioning
confidence: 99%
“…Drawback of proposed algorithm is that it still needs some improvements in order to reduce the complexity so that it can be applied to large social networks. Yuan et al [33] defined a k-degree ldiversity anonymity model for the protection of structural information and sensitive labels of people. Many privacy models like k-anonymity to prevent node reidentification through structure information have been proposed but an attacker may still be able to obtain private information of a person i.e.…”
Section: Fig 2 Social Network Graph With 7 Nodes and Sensitive Attrimentioning
confidence: 99%
“…Although researchers have proposed various anonymous models based on k-anonymity [6] to achieve privacy protection in existing research [7][8][9], the balance between privacy safety and data utility is still new in the field of social network publishing [4]. The existing approaches may prevent leakage of some privacy information when publishing social network data, but may result in nontrivial utility loss without exploring the attribute of sparse distribution and without recognizing the fact that different nodes have different impacts on the network structure.…”
Section: Introductionmentioning
confidence: 99%