期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Social Media-Driven User Community Finding with Privacy Protection
1
作者 Jianye Xie Xudong Wang +5 位作者 Yuwen Liu Wenwen Gong Chao Yan Wajid Rafique Maqbool Khan Arif Ali Khan 《Tsinghua Science and Technology》 2025年第4期1782-1792,共11页
In the digital era,social media platforms play a crucial role in forming user communities,yet the challenge of protecting user privacy remains paramount.This paper proposes a novel framework for identifying and analyz... In the digital era,social media platforms play a crucial role in forming user communities,yet the challenge of protecting user privacy remains paramount.This paper proposes a novel framework for identifying and analyzing user communities within social media networks,emphasizing privacy protection.In detail,we implement a social media-driven user community finding approach with hashing named MCF to ensure that the extracted information cannot be traced back to specific users,thereby maintaining confidentiality.Finally,we design a set of experiments to verify the effectiveness and efficiency of our proposed MCF approach by comparing it with other existing approaches,demonstrating its effectiveness in community detection while upholding stringent privacy standards.This research contributes to the growing field of social network analysis by providing a balanced solution that respects user privacy while uncovering valuable insights into community dynamics on social media platforms. 展开更多
关键词 multi-source social media privacy-preservation user community finding HASH
原文传递
Preserving privacy information flow security in composite service evolution
2
作者 Huan-feng PENG Zhi-qiu HUANG +3 位作者 Lin-yuan LIU Yong LI Da-juan FAN Yu-qing WANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第5期626-638,共13页
After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. W... After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service. 展开更多
关键词 Composite service Privacy information flow security Service evolution Petri net
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部