Exploiting Two‐Level Information Entropy across Social Networks for User Identification

L Xing, K Deng, H Wu, P Xie… - … and Mobile Computing, 2021 - Wiley Online Library
… Narayanan and Shmatikov [22] demonstrated that user identification can be accomplished
by relying on network topology information; however, the user identification performance …

Identifying user behavior on Twitter based on multi-scale entropy

S He, H Wang, ZH Jiang - Proceedings 2014 IEEE …, 2014 - ieeexplore.ieee.org
… usually create lots of spam information that is harmful to other … Entropy method to measure
the complexity of each user's … In Section 2 we introduce the Multi-scale Entropy method for …

Where you are is who you are: User identification by matching statistics

FM Naini, J Unnikrishnan, P Thiran… - … on Information …, 2015 - ieeexplore.ieee.org
… We also analyze the effectiveness of k-anonymization in resisting user identification attacks
… which the available information about a user’s data is in the form of histograms of the user’s …

A Semi-Supervised User Group Identification Based on Synergetic Neural Network and Information Entropy

Z Huang, Y Chen - Sensors & Transducers, 2013 - search.proquest.com
identify user groups; Secondly, we propose a noise filter based on information entropy to
reduce … in this paper has a higher performance for user group identification, and provide a good …

Influential nodes identification in complex networks via information entropy

C Guo, L Yang, X Chen, D Chen, H Gao, J Ma - Entropy, 2020 - mdpi.com
… aimed to identify a set of influential nodes via information entropy. Firstly, the information
entropy of … Then, select the node with the largest information entropy and renovate its l-length …

Δ-Entropy: Definition, properties and applications in system identification with quantized data

B Chen, Y Zhu, J Hu, JC Prı - Information Sciences, 2011 - Elsevier
… In Section 4.2, we apply the Δ-entropy criterion in system identification with quantized I/O data.
… We can use Theorem 2 and the bound of the discrete entropy to obtain a bound on the Δ-…

An entropy-based analytic model for the privacy-preserving in open data

SH Kim, C Jung, YJ Lee - … Conference on Big Data (Big Data), 2016 - ieeexplore.ieee.org
… The entropy represents the uncertainty of the information … the entropy is how much information
we need to identify data… researches use the entropy to determine re-identification risk […

Collaborative filtering with entropy‐driven user similarity in recommender systems

W Wang, G Zhang, J Lu - International Journal of Intelligent …, 2015 - Wiley Online Library
… to incorporate the entropy evaluation and introduce user coherence by … information entropy
of the relative rating differences between two users captures additional coherent information

Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data

A Majeed, S Lee - Applied Intelligence, 2020 - Springer
… a user attributes’ susceptibility and entropy based … unique identifications of multiple users
(ie, users’ community) caused by the highly susceptible QIs. We adapt the information entropy

An entropy based method for measuring anonymity

M Bezzi - 2007 Third International Conference on Security and …, 2007 - ieeexplore.ieee.org
… An entropy based measure was already proposed for computing information loss [11], and,
… Although the use of this quantity as an utility measure is strongly debated [17], [11], it still …