A comprehensive analysis of privacy-preserving solutions developed for online social networks
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …
tools, the use of various online social networks (OSNs) has significantly increased. On the …
Mitigating the privacy issues in retrieval-augmented generation (rag) via pure synthetic data
Retrieval-augmented generation (RAG) enhances the outputs of language models by
integrating relevant information retrieved from external knowledge sources. However, when …
integrating relevant information retrieved from external knowledge sources. However, when …
[HTML][HTML] Friendship links-based privacy-preserving algorithm against inference attacks
J Shen, J Tian, Z Wang, H Cai - Journal of King Saud University-Computer …, 2022 - Elsevier
Directly publishing the original data of social networks may compromise personal privacy
because social relationship data contain sensitive information about users. To protect the …
because social relationship data contain sensitive information about users. To protect the …
Privacy-preserving algorithm based on vulnerable nodes for social relationships
J Shen, J Tian, Z Wang - The Journal of Supercomputing, 2024 - Springer
In the contemporary era, online social networks have become the prevalent medium for
interpersonal interactions, encompassing a multitude of virtual social relationships. To …
interpersonal interactions, encompassing a multitude of virtual social relationships. To …
Edge-DPSDG: An Edge-based Differential Privacy Protection Model for Smart Healthcare
M Lyu, Z Ni, Q Chen, F Li - IEEE Transactions on Big Data, 2024 - ieeexplore.ieee.org
The edge computing paradigm has revolutionized the healthcare sector, providing more real-
time medical data processing and analysis, which also poses more serious privacy and …
time medical data processing and analysis, which also poses more serious privacy and …
Preserving Social Relationship Privacy via the Exponential Mechanism of Personalized Differential Privacy
J Shen, J Tian, Z Wang, Q Zhu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Presently, the majority of social networking platforms tend to outsource the analysis of social
relationship data to third-party companies. Existing methods, which generally aim to protect …
relationship data to third-party companies. Existing methods, which generally aim to protect …
[PDF][PDF] Anonymizing trajectory data: Limitations and opportunities
A variety of conditions and limiting properties complicate the anonymization of trajectory
data, since they are sequential, high-dimensional, bound to geophysical restrictions and …
data, since they are sequential, high-dimensional, bound to geophysical restrictions and …
Analysis and Measurement of Attack Resilience of Differential Privacy
Differential Privacy (DP) is the de facto standard privacy metric in private learning. Its robust
mathematical definition makes it especially appealing for global data analytics without …
mathematical definition makes it especially appealing for global data analytics without …
Exploiting Attribute Correlation for Reconstruction Attacks on Differentially Private Multi-Attributed Data
Differential Privacy (DP) is a widely used data privacy-preserving technique with single-
attribute DP being a common approach, in which manipulated noise is applied to each data …
attribute DP being a common approach, in which manipulated noise is applied to each data …