Privacy-Preserving Approach PBCN in Social Network With Differential Privacy

Article Properties
Cite
Huang, Haiping, et al. “Privacy-Preserving Approach PBCN in Social Network With Differential Privacy”. IEEE Transactions on Network and Service Management, vol. 17, no. 2, 2020, pp. 931-45, https://doi.org/10.1109/tnsm.2020.2982555.
Huang, H., Zhang, D., Xiao, F., Wang, K., Gu, J., & Wang, R. (2020). Privacy-Preserving Approach PBCN in Social Network With Differential Privacy. IEEE Transactions on Network and Service Management, 17(2), 931-945. https://doi.org/10.1109/tnsm.2020.2982555
Huang, Haiping, Dongjun Zhang, Fu Xiao, Kai Wang, Jiateng Gu, and Ruchuan Wang. “Privacy-Preserving Approach PBCN in Social Network With Differential Privacy”. IEEE Transactions on Network and Service Management 17, no. 2 (2020): 931-45. https://doi.org/10.1109/tnsm.2020.2982555.
Huang H, Zhang D, Xiao F, Wang K, Gu J, Wang R. Privacy-Preserving Approach PBCN in Social Network With Differential Privacy. IEEE Transactions on Network and Service Management. 2020;17(2):931-45.
Refrences
Title Journal Journal Categories Citations Publication Date
Emergence of Scaling in Random Networks

Science
  • Science: Science (General)
18,446 1999
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy 2018
10.1137/1.9781611972788.67
k-Degree anonymity and edge selection: improving data utility in large networks Knowledge and Information Systems
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
36 2016
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks Knowledge and Information Systems
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
93 2010
Citations
Title Journal Journal Categories Citations Publication Date
Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach

Security and Communication Networks
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
4 2022
Differential Privacy via Haar Wavelet Transform and Gaussian Mechanism for Range Query

Computational Intelligence and Neuroscience
  • Medicine: Medicine (General): Computer applications to medicine. Medical informatics
  • Science: Biology (General)
  • Medicine: Internal medicine: Neurosciences. Biological psychiatry. Neuropsychiatry
  • Medicine: Internal medicine: Neurosciences. Biological psychiatry. Neuropsychiatry
2022
Citations Analysis
The category Science: Science (General): Cybernetics: Information theory 1 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach and was published in 2022. The most recent citation comes from a 2022 study titled Privacy-Enhanced Intrusion Detection and Defense for Cyber-Physical Systems: A Deep Reinforcement Learning Approach. This article reached its peak citation in 2022, with 2 citations. It has been cited in 2 different journals. Among related journals, the Security and Communication Networks cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year