De-anonymiation method for networks based on DeepLink
Existing de-anonymization technologies are mainly based on the network structure.To learn and express network structure is the key step of de-anonymization.The purpose of the user identity linkage is to detect the same user from different social networking platforms.DeepLink is a cross-social networ...
Saved in:
Main Authors: | Pei WANG, Yan JIA, Aiping LI, Qianyue JIANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020045 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Overview of privacy preserving in social network
by: Rui-xin YAO, et al.
Published: (2016-04-01) -
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook
by: Abdul Majeed, et al.
Published: (2022-01-01) -
Anonymization algorithm based on time density for data stream
by: Jing XIE, et al.
Published: (2014-11-01) -
Differentially private data release based on clustering anonymization
by: Xiao-qian LIU, et al.
Published: (2016-05-01) -
Method of constructing an anonymous graph based on information loss estimation
by: Jie SU, et al.
Published: (2016-06-01)