WQ Huang, JF Xia, M Yu, C Liu - Journal of Physics: Conference …, 2018 - iopscience.iop.org
Attackers can exploit the published data of the social network by the technology of big data
analysis to find the user's privacy without any permission or friendship. In this paper, to solve …