pith. machine review for the scientific record. sign in

arxiv: 1809.05926 · v1 · submitted 2018-09-16 · 💻 cs.SI

Recognition: unknown

On analyzing and evaluating privacy measures for social networks under active attack

Authors on Pith no claims yet
classification 💻 cs.SI
keywords networksprivacyviolationsocialactivegeneratedlargemeasures
0
0 comments X
read the original abstract

Widespread usage of complex interconnected social networks such as Facebook, Twitter and LinkedIn in modern internet era has also unfortunately opened the door for privacy violation of users of such networks by malicious entities. In this article we investigate, both theoretically and empirically, privacy violation measures of large networks under active attacks that was recently introduced in (Information Sciences, 328, 403-417, 2016). Our theoretical result indicates that the network manager responsible for prevention of privacy violation must be very careful in designing the network if its topology does not contain a cycle. Our empirical results shed light on privacy violation properties of eight real social networks as well as a large number of synthetic networks generated by both the classical Erdos-Renyi model and the scale-free random networks generated by the Barabasi-Albert preferential-attachment model.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.