Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy preserving social network data publication
The introduction of online social networks (OSN) has transformed the way people connect
and interact with each other as well as share information. OSN have led to a tremendous …
and interact with each other as well as share information. OSN have led to a tremendous …
[HTML][HTML] Optimization of big data scheduling in social networks
In social network big data scheduling, it is easy for target data to conflict in the same data
node. Of the different kinds of entropy measures, this paper focuses on the optimization of …
node. Of the different kinds of entropy measures, this paper focuses on the optimization of …
N-sanitization: A semantic privacy-preserving framework for unstructured medical datasets
The introduction and rapid growth of the Internet of Medical Things (IoMT), a subset of the
Internet of Things (IoT) in the medical and healthcare systems, has brought numerous …
Internet of Things (IoT) in the medical and healthcare systems, has brought numerous …
A survey of graph-modification techniques for privacy-preserving on networks
Recently, a huge amount of social networks have been made publicly available. In parallel,
several definitions and methods have been proposed to protect users' privacy when publicly …
several definitions and methods have been proposed to protect users' privacy when publicly …
KDVEM: ak-degree anonymity with vertex and edge modification algorithm
Privacy is one of the most important issues in social social network data sharing. Structure
anonymization is a effective method to protect user from being reidentfied through graph …
anonymization is a effective method to protect user from being reidentfied through graph …
[PDF][PDF] k-Anonymity: From Theory to Applications.
k-Anonymity is a well-known privacy model originally designed to protect the identities of the
individuals involved in the release of a data collection. It provides a privacy requirement and …
individuals involved in the release of a data collection. It provides a privacy requirement and …
k-Degree anonymity and edge selection: improving data utility in large networks
The problem of anonymization in large networks and the utility of released data are
considered in this paper. Although there are some anonymization methods for networks …
considered in this paper. Although there are some anonymization methods for networks …
Some basics on privacy techniques, anonymization and their big data challenges
With the progress in the information and communication fields, new opportunities and
technologies for statistical analysis, knowledge discovery, data mining, and many other …
technologies for statistical analysis, knowledge discovery, data mining, and many other …
TSRAM: A time-saving k-degree anonymization method in social network
Social networks provide an attractive environment in order to have low cost and easy
communication; however, analyzing huge amounts of produced data can considerably affect …
communication; however, analyzing huge amounts of produced data can considerably affect …
A fast graph modification method for social network anonymization
Privacy on social networks is one of the most important and well-known issues. Various
algorithms have been proposed to preserve the privacy of social network, all of which try to …
algorithms have been proposed to preserve the privacy of social network, all of which try to …