期刊文献+

Location-and Relation-Based Clustering on Privacy-Preserving Social Networks 被引量:2

Location-and Relation-Based Clustering on Privacy-Preserving Social Networks
原文传递
导出
摘要 Graph clustering has a long-standing problem in that it is difficult to identify all the groups of vertices that are cohesively connected along their internal edges but only sparsely connected along their external edges. Apart from structural information in social networks, the quality of the location-information clustering has been improved by identifying clusters in the graph that are closely connected and spatially compact. However, in real-world scenarios, the location information of some users may be unavailable for privacy reasons, which renders existing solutions ineffective. In this paper, we investigate the clustering problem of privacy-preserving social networks, and propose an algorithm that uses a prediction-and-clustering approach. First, the location of each invisible user is predicted with a probability distribution. Then, each user is iteratively assigned to different clusters. The experimental results verify the effectiveness and efficiency of our method, and our proposed algorithm exhibits high scalability on large social networks. Graph clustering has a long-standing problem in that it is difficult to identify all the groups of vertices that are cohesively connected along their internal edges but only sparsely connected along their external edges. Apart from structural information in social networks, the quality of the location-information clustering has been improved by identifying clusters in the graph that are closely connected and spatially compact. However, in real-world scenarios, the location information of some users may be unavailable for privacy reasons, which renders existing solutions ineffective. In this paper, we investigate the clustering problem of privacy-preserving social networks, and propose an algorithm that uses a prediction-and-clustering approach. First, the location of each invisible user is predicted with a probability distribution. Then, each user is iteratively assigned to different clusters. The experimental results verify the effectiveness and efficiency of our method, and our proposed algorithm exhibits high scalability on large social networks.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第4期453-462,共10页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China (Nos. 61602129, 61702132, and 61702133) the Natural Science Foundation of Heilongjiang Province (Nos. QC2017069 and QC2017071) Fundamental Research Funds for the Central Universities (Nos. HEUCFJ170602 and HEUCFJ160601) the China Postdoctoral Science Foundation (No. 166875) Heilongjiang Postdoctoral Fund (No. LBH-Z16042)
关键词 CLUSTERING location prediction PRIVACY-PRESERVING social networks clustering location prediction privacy-preserving social networks
  • 相关文献

参考文献2

二级参考文献34

  • 1K.M.Heussner,Google,Apple track users’location information,but why?http://abcnews.go.com/Technology/,April 29,2011.
  • 2B.Guo,Z.Wang,Z.Yu,Y.Wang,N.Yen,R.Huang,and X.Zhou,Mobile crowd sensing and computing:The review of an emerging human-powered sensing paradigm,ACM Computing Surveys,vol.48,no.1,p.7,2015.
  • 3X.Su,H.Tong,and P.Ji,Activity recognition with smartphone sensors,Tsinghua Science and Technology,vol.19,no.3,pp.235-249,2014.
  • 4Y.Wang,F.Li,and T.Dahlberg,Energy-efficient topology control for three-dimensional sensor networks,International Journal of Sensor Networks,vol.4,nos.1&2,pp.68-78,2008.
  • 5Y.Wang,W.-Z.Song,W.Wang,X.-Y.Li,and T.Dahlberg,LEARN:Localized energy aware restricted neighborhood routing for ad hoc networks,in Proc.of IEEE SECON,2006.
  • 6Y.Zhu,C.Zhang,F.Li,and Y.Wang,Geo-Social:Routing with location and social metrics in mobile opportunistic networks,in Proc.of IEEE ICC,2015.
  • 7A.R.Beresford and F.Stajano,Location privacy in pervasive computing,IEEE Pervasive Computing,vol.2,pp.46-55,2003.
  • 8M.Gruteser and D.Grunwald,Anonymous usage of location-based services through spatial and temporal cloaking,in Proc.of ACM Mobi Sys,2003.
  • 9T.Xu and Y.Cai,Feeling-based location privacy protection for location-based services,in Proc.of ACM CCS’09,2009.
  • 10T.Brinkhoff,A framework for generating network-based moving objects,Geo Informatica,vol.6,pp.153-180,2002.

共引文献6

同被引文献5

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部