link privacy between labeled vertics

    There  are  two  main  mechnisms  for preserving   link privacy between labeled vertices. The  first  approach  is  to perform  clustering of vertices  and  edges,and  aggregate them into super vertices.in  this  way,information about corresponding sub-graphs can be anonymized.While  these  clustering approaches permit analysis of some  macro-level graph properties,they  are  not suitable for  blackbox application   of  existing  social  network   based  applications.such as  sybil defenses.The second class of approaches  aim to introduce perturbation in  the social graph by  adding  and  deleting edges  and  vertices.Next  ,we discuss this  line of  research  in  more  detail.

    Hay  propose a perturbation algorithm which  applies a  sequences of  K   edge  deletions   followed  by  k random edge  insertions.Candidates  for  edge deletion  are  sampled uniformly at  random  from  the  space of  existing  edges  in  graph  G,while  candidates for edge insertion are  sampled uniformly  at  random from the space of  edges not  in  G.The key difference between our perturbation  mechanism and  that  of  Hay  is  that  we  sample  edges for insetion based on the structure of  the  original  graph(as  opposed to random selection).

    

时间: 2024-11-08 11:41:07

link privacy between labeled vertics的相关文章

Anonymizing the vertics

Although  the  techniques  described  above  reveal the   identity  of  the  vertics  in  the social graph but add noise to  the  relationships between them,there  have  been various works in the literature that  aim  at  anonymizing  the  identities

Python 获取Facebook特定用户的feed和link

CODE: #!/usr/bin/python # -*- coding: utf-8 -*- ''' Created on 2014-8-9 @author: guaguastd @name: facebook_connection_query.py ''' # impot login from login import facebook_login # import helper from helper import pp # access to facebook facebook_api

Automotive Security的一些资料和心得(5):Privacy

1. Introduction 1.1 "Customers own their data and we can be no more than the trsted stewards of that data". Ford CEO, Mark Fields, 2015 U.S. government affairs February 2015, Senators Markey and Blumenthal. “cyber dashboard”. Link. 1.2. 隐私和数据保护

Labeled Faces in the Wild 人脸识别数据集

http://blog.csdn.net/garfielder007/article/details/51480525 New (draft) survey paper: Labeled Faces in the Wild: A SurveyErik Learned-Miller, Gary Huang, Aruni RoyChowdhury, Haoxiang Li, Gang Hua The camera-ready has not yet been submitted. If you se

[PReact] Use Link State to Automatically Handle State Changes

Storing and updating values inside a component’s local state (known as controlled components) is such a common pattern that Preact offers a really handy feature called ‘link state’ that not only removes the need to bind class methods, but also handle

HTML5移动开发中的meta与link

meta HTML5移动开发中的一些webkit专属头部标签,能够帮助浏览器更好的解析HTML代码,从而为HTML5移动开发提供更好的前端表现与体验 viewport网页缩放 1 <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0, user-scalable=no" /> UTF-8编码 1

[转载] Docker网络原则入门:EXPOSE,-p,-P,-link

原文: http://dockone.io/article/455 如果你已经构建了一些多容器的应用程序,那么肯定需要定义一些网络规则来设置容器间的通信.有多种方式可以实现:可以通过--expose参数在运行时暴露端口,或者在Dockerfile里使用EXPOSE指令.还可以在Docker run的时候通过-p或者-P参数来发布端口.或者通过--link链接容器.虽然这些方式几乎都能达到一样的结果,但是它们还是有细微区别.那么到底应该使用哪一种呢? TL:DR 使用-p或者-P来创建特定端口绑定

ifconfig、route、ip route、ip addr、 ip link 用法

网络管理是一个复杂而庞大的体系,博主最近刚好学了一点关于网络的知识,就跟大家分享一下,如何管理网卡.配置及查看ip地址和路由表.主要通过以下几个命令来演示一下. 一.ifconfig 1)配置地址: 比如修改eth0网卡的ip为192.168.174.100,子网掩码为255.255.255.0 ifconfig eth0 192.168.174.100/24 使用ifconfig修改ip会直接在内存中生效,重启系统或者重启network服务就丢失. 重启服务:Centos6:service n

尽量少嵌套无用的div;外部文件尽量使用link而不要使用用@import

最近的工作又学到了很多东西,在这里记录一下. 1,尽量少嵌套无用的div,这个问题领导很严肃的跟我提过很多次,因为我很喜欢用很多div,而且有很多div都是无存在意义的.后来领导给了我一些资料,我看了一下,发现这样做确实存在很大的问题,原因如下:(以下蓝底文字摘自搜狐WEB标准) 2.1 节约运营成本 采用 WEB 标准制作,我们可以做到表现和形式及内容的分离,我们采用XHTML 语言来表现(数据),用CSS 来控制(页面元素呈现的)形式.写的好的页面,XHTML 代码中基本上都是用户要看的数据