Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive bibliometric analysis on social network anonymization: current approaches and future directions
In recent decades, social network anonymization has become a crucial research field due to
its pivotal role in preserving users' privacy. However, the high diversity of approaches …
its pivotal role in preserving users' privacy. However, the high diversity of approaches …
A fast graph modification method for social network anonymization
Privacy on social networks is one of the most important and well-known issues. Various
algorithms have been proposed to preserve the privacy of social network, all of which try to …
algorithms have been proposed to preserve the privacy of social network, all of which try to …
Publishing community-preserving attributed social graphs with a differential privacy guarantee
We present a novel method for publishing differentially private synthetic attributed graphs.
Unlike preceding approaches, our method is able to preserve the community structure of the …
Unlike preceding approaches, our method is able to preserve the community structure of the …
GRAM: An efficient (k, l) graph anonymization method
There are plenty of applications that use graphs for representing the association between
different entities. Many research communities are interested in publishing such graphs to …
different entities. Many research communities are interested in publishing such graphs to …
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs
With the emergence of network-centric data, social network graph publishing is conducive to
data analysts to mine the value of social networks, analyze the social behavior of individuals …
data analysts to mine the value of social networks, analyze the social behavior of individuals …
How to hide one's relationships from link prediction algorithms
Our private connections can be exposed by link prediction algorithms. To date, this threat
has only been addressed from the perspective of a central authority, completely neglecting …
has only been addressed from the perspective of a central authority, completely neglecting …
Large-scale dynamic social network directed graph k-in&out-degree anonymity algorithm for protecting community structure
X Zhang, J Liu, J Li, L Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Social network data publishing is dynamic, and attackers can perform association attacks
based on social network directed graph data at different times. The existing social network …
based on social network directed graph data at different times. The existing social network …
Conditional adjacency anonymity in social graphs under active attacks
Social network data is typically made available in a graph format, where users and their
relations are represented by vertices and edges, respectively. In doing so, social graphs …
relations are represented by vertices and edges, respectively. In doing so, social graphs …
On breaking truss-based communities
A k-truss is a graph such that each edge is contained in at least k-2 triangles. This notion has
attracted much attention, because it models meaningful cohesive subgraphs of a graph. We …
attracted much attention, because it models meaningful cohesive subgraphs of a graph. We …
FSopt_k: Finding the Optimal Anonymization Level for a Social Network Graph
k-degree anonymity is known as one of the best models for anonymizing social network
graphs. Although recent works have tried to address the privacy challenges of social …
graphs. Although recent works have tried to address the privacy challenges of social …