More than Just Lines on a Map: Best Practices for U.S Bike Routes
ppdm in social network 2nd part
1. Privacy Preserving Social
Network Data Mining(2nd)
S.HAMIDE RASOULI
23.8.1394
ALZAHRA UNIVERSITY
ADVANCED TOPICS IN SOFTWARE ENGINEERING/ DR.KEYVANPOUR
1
/19
2. INDEX
Review
ML in Classical approaches
Drawbacks of all classical approaches
ML approach
2
/19
9. ML in Random Based Anonymization
approach
9
Not adding or removing any edges(adding noise) cost the same
Goal : to Preserve Utility
Social Role
/19
10. ML in K-Anonymity
Goal : to Preserve Utility
Special background knowledge
K-anonymity/L-diversity/T-closeness
10
age
Similarity
(No lable) CLUSTERING
4-Anonymity
Age : QI
/19
11. ML in K-Anonymity
Age : QI
Disease : Sensitive
11
age
4-Anonymity
K-anonymity L-diversity T-closeness
Ali has a hard
disease
Ali has
cancer
Ali has ?
/19
13. Another type of ML usage in ppsndm
APA (attack-protect-attack)
Naïve baysian classifier:
Local classifier (Prior label)
Relational classifier(Hemophily Rule) (Update Label)
Collaborative inference algorithm (Iteration)
13
/19
14. Drawbacks of all these approaches
Handy (parameter …)
Modifications Not Generic
Special Attack Privacy
Special measure Utility
Clustering Utility Loss(local knowledge)
a set of Anonymization procedures
14
/19
18. REFRENCES:
1-GRAPH ANONYMIZATION USING MACHINE LEARNING/MARIA LAURA MAAG, LUDOVIC DENOYER, PATRICK
GALLINARI/2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND
APPLICATIONSEMPIRICAL
2-COMPARISONS OF ATTACK AND PROTECTION ALGORITHMSFOR ONLINE SOCIAL NETWORKS/MINGZHEN MO,
IRWIN KINGA, AND KWONG-SAK LEUNG PROCEDIA COMPUTER SCIENCE 5 (2011)THE 8TH INTERNATIONAL
CONFERENCE ON MOBILE WEB INFORMATION SYSTEMS (MOBIWIS)
3-ارائهالگوریتمیحریصانهبرایحفظحریمخصوصیدادههایمنتشرشدهشبکههایاجتماعی/احسانسرگلزایی,محمدعبدالهیازگمی/اولینهمایشملیکاربردسیستم
هایهوشمند(محاسباتنرم)درعلوموصنایعدانشگاهآزاداسالمیواحدقوچان
4-ATTACK VECTOR ANALYSIS AND PRIVACY-PRESERVING SOCIAL NETWORK DATA PUBLISHING/MOHD IZUAN HAFEZ
NINGGAL JEMAL ABAWAJY/2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11
5-EDGE ANONYMITY IN SOCIAL NETWORK GRAPHS/LIJIE ZHANG AND WEINING ZHANG/2009 INTERNATIONAL
CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING
6-ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING/TAMIR TASSA
AND DROR J. COHEN/IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,2013
7-A HYBRID ALGORITHM FOR PRIVACY PRESERVING SOCIAL NETWORK PUBLICATION PENG LIU, LEI CUI1, AND
XIANXIAN LI SPRINGER 2014
18
/19