Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Anonymization techniques for privacy preserving data publishing: A comprehensive survey
A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …
owners such as hospitals, banks, social network (SN) service providers, and insurance …
A survey on secure data analytics in edge computing
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …
generated by IoT devices. Those data after analytics provide significant information that …
Collective data-sanitization for preventing sensitive information inference attacks in social networks
Releasing social network data could seriously breach user privacy. User profile and
friendship relations are inherently private. Unfortunately, sensitive information may be …
friendship relations are inherently private. Unfortunately, sensitive information may be …
[PDF][PDF] Dependence makes you vulnberable: Differential privacy under dependent tuples.
Differential privacy (DP) is a widely accepted mathematical framework for protecting data
privacy. Simply stated, it guarantees that the distribution of query results changes only …
privacy. Simply stated, it guarantees that the distribution of query results changes only …
A survey on privacy in social media: Identification, mitigation, and applications
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …
participate in numerous activities on a daily basis. This results in tremendous amounts of …
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …
span many different domains, ranging from online social network data from networks like …
Social network de-anonymization and privacy inference with knowledge graph model
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …
business interests, but it has raised much concern on users' privacy. Even though users' …
{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …
De-anonymizing social networks and inferring private attributes using knowledge graphs
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …
business interests, but it has raised much concern on users' privacy. Even though users' …
Survey on improving data utility in differentially private sequential data publishing
X Yang, T Wang, X Ren, W Yu - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
The massive generation, extensive sharing, and deep exploitation of data in the big data era
have raised unprecedented privacy threats. To address privacy concerns, various privacy …
have raised unprecedented privacy threats. To address privacy concerns, various privacy …