全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

基于贪心扰动的社交网络隐私保护研究

DOI: 10.3969/j.issn.0372-2112.2013.08.021, PP. 1586-1591

Keywords: 数据挖掘,社交网络,隐私保护,贪心扰动算法

Full-Text   Cite this paper   Add to My Lib

Abstract:

在社交网络的数据挖掘隐私保护问题中,连接边的权重和权重的隐私保护问题是非常重要的.为此,提出一种贪心扰动的隐私保护算法,以保证社交网络初始的最短路径不变并使其长度与扰动后相接近.仿真模拟计算结果表明,这种扰乱策略符合预期的理论分析结果.

References

[1]  B Zhou,J Pei.Preserving privacy in social networks against neighborhood attacks[A].Proceedings of the 24th International Conference on Data Engineering(ICDE''08)[C].Cancun,Mexico,2008.506-515.
[2]  王昌达,华明辉,周从华,宋香梅,鞠时光.基于抽象和搜索空间划分的安全性判定方法.计算机科学,2011,38(10):55-59. Wang Chang-da,Hua Ming-hui,Zhou Cong-hua,Song Xiang-mei,Ju Shi-guang,Security analysis of access control policy based on predicate abstract and verification space division[J].Computer Science,2011,38(10):55-59.(in Chinese)
[3]  吴英杰,王一蕾,廖尚斌,王晓东.面向事务型数据隐私保护的p-剖分l-多样化算法[J].南京大学学报,2011,47(5):551-558. Wu Ying-jie,Wang Yi-lei,Liao Shang-bin,Wang Xiao-dong,A p-anatomy l-diversity algorithm for protecting transactional data privacy[J].Journal of Nanjing University(Natural Sciences),2011,47(5):551-558.(in Chinese)
[4]  乔秀全,杨春,李晓峰,陈俊亮.社交网络服务中一种基于用户上下文的信任度计算方法.计算机学报,2011,34(12):2403-2413. QIAO Xiu-quan,Yang Chun Li Xiao-feng Chen Jun-liang,A trust calculating algorithm based on social networking service users''context[J] Chinese Journal of Computers,2011,34(12):2403-2413.(in Chinese)
[5]  T H Cormen,C E Leiserson,R LRivest,C Stein.算法导论[M].潘金贵 顾铁成 李成法,等译.北京:机械工业出版社.2009:357-369.
[6]  M Hay,G Miklau,D Jensen,P Weis,S Srivastava.Anonymizing Social Networks[R].University of Massachusetts,Amherst,MA,2007.
[7]  王涛春,罗永龙,左开中,杜安红.隐私保护的不同坐标系两点距离计算[J].计算机科学,2011,38(8):65-68. Wang Tao-chun Luo Yong-long Zuo Kai-zhong Du An-hong,Privacy-preservingDistance measure of different coordinates[J].Computer Science,2011,38(8):65-68.(in Chinese)
[8]  韩建民,于娟,虞慧群,贾.面向敏感值的个性化隐私保护[J].电子学报,2010,38(7):1723-1728. Han Jian-min,Yu Juan,Yu Hui-qun,Jia Jiong.Individuation privacy preservation oriented to sensitive values[J].Acta Electronica Sinica,2010,38(7):1723-1728.(in Chinese)
[9]  J Bang-Jensen,G Gutin.有向图的理论、算法及其应用[M].姚兵 张忠辅译.北京:科学出版社,2009. J Bang-Jensen,G Gutin.Digraphs Theory,Algorithms and Applications[M].Springer-Verlag,2008.(in Chinese)
[10]  李锋.面向数据挖掘的隐私保护方法研究[D].上海:上海交通大学,2008. Li F.Research on privacy preserving methods for data mining[D].Shanghai:Shanghai Jiaotong University,2008.(in Chinese).
[11]  韩建民,岑婷婷,虞慧群.数据表k-匿名化的微聚集算法研究[J].电子学报,2008,36(11):2021-2029. Hart Jian-min,Cen Ting-ting,Yu hun-qun.Research in microaggregation algorithms for k-anonymization[J].Acta Electronica Sinica,2008,36(11):2021-2029.(in Chinese).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133