A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022 - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …

Mitigating the privacy issues in retrieval-augmented generation (rag) via pure synthetic data

S Zeng, J Zhang, P He, J Ren, T Zheng, H Lu… - arxiv preprint arxiv …, 2024 - arxiv.org
Retrieval-augmented generation (RAG) enhances the outputs of language models by
integrating relevant information retrieved from external knowledge sources. However, when …

[HTML][HTML] Friendship links-based privacy-preserving algorithm against inference attacks

J Shen, J Tian, Z Wang, H Cai - Journal of King Saud University-Computer …, 2022 - Elsevier
Directly publishing the original data of social networks may compromise personal privacy
because social relationship data contain sensitive information about users. To protect the …

Privacy-preserving algorithm based on vulnerable nodes for social relationships

J Shen, J Tian, Z Wang - The Journal of Supercomputing, 2024 - Springer
In the contemporary era, online social networks have become the prevalent medium for
interpersonal interactions, encompassing a multitude of virtual social relationships. To …

Edge-DPSDG: An Edge-based Differential Privacy Protection Model for Smart Healthcare

M Lyu, Z Ni, Q Chen, F Li - IEEE Transactions on Big Data, 2024 - ieeexplore.ieee.org
The edge computing paradigm has revolutionized the healthcare sector, providing more real-
time medical data processing and analysis, which also poses more serious privacy and …

Preserving Social Relationship Privacy via the Exponential Mechanism of Personalized Differential Privacy

J Shen, J Tian, Z Wang, Q Zhu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Presently, the majority of social networking platforms tend to outsource the analysis of social
relationship data to third-party companies. Existing methods, which generally aim to protect …

[PDF][PDF] Anonymizing trajectory data: Limitations and opportunities

P Guerra-Balboa, AM Pascual… - Proceddings of the …, 2022 - aaai-ppai22.github.io
A variety of conditions and limiting properties complicate the anonymization of trajectory
data, since they are sequential, high-dimensional, bound to geophysical restrictions and …

Analysis and Measurement of Attack Resilience of Differential Privacy

P Guerra-Balboa, A Sauer, T Strufe - … of the 23rd Workshop on Privacy in …, 2023 - dl.acm.org
Differential Privacy (DP) is the de facto standard privacy metric in private learning. Its robust
mathematical definition makes it especially appealing for global data analytics without …

Exploiting Attribute Correlation for Reconstruction Attacks on Differentially Private Multi-Attributed Data

Y Jiang, B Ma, X Wang, G Yu, C Sun, W Ni… - Available at SSRN … - papers.ssrn.com
Differential Privacy (DP) is a widely used data privacy-preserving technique with single-
attribute DP being a common approach, in which manipulated noise is applied to each data …