期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Research on Privacy Disclosure Detection Method in Social Networks Based on Multi-Dimensional Deep Learning
1
作者 Yabin Xu Xuyang Meng +1 位作者 Yangyang Li Xiaowei Xu 《Computers, Materials & Continua》 SCIE EI 2020年第1期137-155,共19页
In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users,this paper takes microblog as the research object to study the detection of privacy disclosure ... In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users,this paper takes microblog as the research object to study the detection of privacy disclosure in social networks.First,we perform fast privacy leak detection on the currently published text based on the fastText model.In the case that the text to be published contains certain private information,we fully consider the aggregation effect of the private information leaked by different channels,and establish a convolution neural network model based on multi-dimensional features(MF-CNN)to detect privacy disclosure comprehensively and accurately.The experimental results show that the proposed method has a higher accuracy of privacy disclosure detection and can meet the real-time requirements of detection. 展开更多
关键词 Social networks privacy disclosure detection multi-dimensional features text classification convolutional neural network
下载PDF
Privacy disclosure in Chinese social networking sites:An investigation of Renren users
2
作者 Chenju ZHU Qi HUANG Qinghua ZHU 《Chinese Journal of Library and Information Science》 2014年第2期31-42,共12页
Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college student... Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college students on Renren.com,a popular college-oriented social networking site in China.Users’ privacy disclosure behaviors were studied and gender difference was analyzed particularly.Correlation analysis was conducted to examine the relationships among evaluation indicators involving user name,image,page visibility,message board visibility,completeness of education information and provision of personal information.Findings:A large amount of personal information was disclosed via social networking sites in China.Greater percentage of male users than female users disclosed their personal information.Furthermore,significantly positive relationships were found among page visibility,message board visibility,completeness of education information and provision of personal information.Research limitations:Subjects were collected from only one social networking website.Meanwhile,our survey involves subjective judgments of user name reliability,category of profile images and completeness of information.Practical implications:This study will be of benefit for college administrators,teachers and librarians to design courses for college students on how to use social networking sites safely.Originality /value:This empirical study is one of the first studies to reveal the current situation of privacy disclosure in the Chinese social networking sites and will help the research community gain a deeper understanding of privacy disclosure in the Chinese social networking sites. 展开更多
关键词 Social networking site(SNS) Personal information privacy disclosure Web 2.0
下载PDF
Fuzz-classification(p,l)-Angel:An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
3
作者 Tehsin Kanwal Hasina Attaullah +2 位作者 Adeel Anjum Abid Khan Gwanggil Jeon 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1131-1140,共10页
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio... The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelization,but these were found to be insufficient in terms of robust privacy and performance.(p,l)-Angelization was successful against different privacy disclosures,but it was not efficient.To the best of our knowledge,no robust privacy model based on fuzzy logic has been proposed to protect the privacy of sensitive attributes with multiple records.In this paper,we suggest an improved version of(p,l)-Angelization based on a hybrid AI approach and privacy-preserving approach like Generalization.Fuzz-classification(p,l)-Angel uses artificial intelligence based fuzzy logic for classification,a high-dimensional segmentation technique for segmenting quasi-identifiers and multiple sensitive attributes.We demonstrate the feasibility of the proposed solution by modelling and analyzing privacy violations using High-Level Petri Nets.The results of the experiment demonstrate that the proposed approach produces better results in terms of efficiency and utility. 展开更多
关键词 Generalization FUZZY-LOGIC MSA privacy disclosures Membership function (p l)-Angelization QT HLPN
下载PDF
RDF(S) repository privacy protection via inference control
4
作者 薛金蓉 郑军 安秋生 《Journal of Beijing Institute of Technology》 EI CAS 2014年第4期495-501,共7页
The privacy protection of resource description framework (schema) (RDF(S) ) repository is an emerging topic in database security area. In this paper, entailment rules are investigated based on RDF(S) repositor... The privacy protection of resource description framework (schema) (RDF(S) ) repository is an emerging topic in database security area. In this paper, entailment rules are investigated based on RDF(S) repository firstly. Then, an idea that uses reasoning closure to judge whether the privacy disclosure caused by inference is existed is proposed. Furthermore, the definitions of impli- cation conditions and information measure of triple statements which gains data hiding algorithm with combining proposition logic reasoning theory are introduced. Meanwhile, a conversion method from conjunctive normal form to disjunctive normal form based minimal hitting sets of set cluster is aiso proposed. Finally, the experimental results show that our algorithm can prevent privacy disclosure of RDF(S) repository effectively. 展开更多
关键词 resource description framework (RDF) reasoning closure privacy disclosure infor-mation measure entailment rule minimal hitting set
下载PDF
A Taint Analysis Framework Applied to Android Applications in the Packed State
5
作者 Shouying Bai Lu Ma +1 位作者 Huan Ma Wei Liu 《China Communications》 SCIE CSCD 2023年第3期336-346,共11页
In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow grap... In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow graph of function,and determine whether there is a security risk.However,with the continuous escalation of offensive and defensive confrontation of source code,more and more applications use reinforcement technology to prevent security practitioners from performing reverse analysis,therefore it is impossible to analyze function-behavior from the source code.Thus,we design a framework of taint analysis that applied to the Android applications,which automatically unpacks the Android APKs,restores the real source code of the App,performs taint analysis,and generates a control-flow graph of function.Experimental tests showed that the system can cope with the current mainstream reinforcement technology and restore the real Dex file quickly.Simultaneously,compared with the number of nodes before packing,the generated control-flow graph had an explosive increase,which effectively assisted manual analysis of App with the privacy leakage behaviors. 展开更多
关键词 privacy disclosure unpacked technology taint analysis
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部