A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022 - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …

[PDF][PDF] 大数据安全与隐私保护

冯登国, 张敏, **昊 - 2014 - cjc.ict.ac.cn
摘要大数据(Big Data) 已成为学术界和产业界的研究热点, **影响着人们日常生活,
工作**惯及思考方式. 但是目前大数据在收集, 存储和使用过程中面临着诸多安全风险 …

Challenges and techniques in Big data security and privacy: A review

R Bao, Z Chen, MS Obaidat - Security and Privacy, 2018 - Wiley Online Library
With the rapid development of information technology, Big data has become a hot topic of
research in governments, academia, and enterprises. On the one hand, Big data brings …

A survey of graph-modification techniques for privacy-preserving on networks

J Casas-Roma, J Herrera-Joancomartí… - Artificial Intelligence …, 2017 - Springer
Recently, a huge amount of social networks have been made publicly available. In parallel,
several definitions and methods have been proposed to protect users' privacy when publicly …

PCG: a privacy preserving collaborative graph neural network training framework

X Miao, W Zhang, Y Jiang, F Fu, Y Shao, L Chen… - The VLDB Journal, 2023 - Springer
Graph neural networks (GNNs) and their variants have generalized deep learning methods
into non-Euclidean graph data, bringing substantial improvement in many graph mining …

HAkAu: hybrid algorithm for effective k-automorphism anonymization of social networks

J Medková, J Hynek - Social Network Analysis and Mining, 2023 - Springer
Online social network datasets contain a large amount of various information about their
users. Preserving users' privacy while publishing or sharing datasets with third parties has …

A review on privacy preservation of social networks using graphs

M Kiranmayi, N Maheswari - Journal of Applied Security Research, 2021 - Taylor & Francis
Social network platform is the one where a huge number of information from social networks
are published and accessed by third parties or with advertising partners for better social …

Evolutionary algorithms for k-anonymity in social networks based on clustering approach

N Yazdanjue, M Fathian, B Amiri - The Computer Journal, 2020 - academic.oup.com
The usage of social networks shows a growing trend in recent years. Due to a large number
of online social networking users, there is a lot of data within these networks. Recently …

Privacy preservation based on clustering perturbation algorithm for social network

F Yu, M Chen, B Yu, W Li, L Ma, H Gao - Multimedia tools and applications, 2018 - Springer
With a vigorous development of information release for social network, it is now an urgent
question to protect sensitive information. The sensitive information concerned by the …

A graph modification approach for k-anonymity in social networks using the genetic algorithm

S Rajabzadeh, P Shahsafi, M Khoramnejadi - Social Network Analysis and …, 2020 - Springer
Social networks, which have become so popular today, allow their users to share
information. The main challenge the users are facing is the security preservation of their …