HY Tran, J Hu - Journal of Parallel and Distributed Computing, 2019 - Elsevier
In this paper, we present a comprehensive survey of privacy-preserving big data analytics. We introduce well-designed taxonomies which offer both systematic views and a detailed …
The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining …
T Wang, Z Zheng, MH Rehmani… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The advancement of data communication technologies promotes widespread data collection and transmission in various application domains, thereby expanding big data significantly …
J Qian, XY Li, C Zhang, L Chen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and business interests, but it has raised much concern on users' privacy. Even though users' …
J Qian, XY Li, C Zhang, L Chen - IEEE INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and business interests, but it has raised much concern on users' privacy. Even though users' …
Background Data science offers an unparalleled opportunity to identify new insights into many aspects of human life with recent advances in health care. Using data science in …
X Hu, Y Tao, CW Chung - Proceedings of the 2013 ACM SIGMOD …, 2013 - dl.acm.org
This paper studies I/O-efficient algorithms for settling the classic triangle listing problem, whose solution is a basic operator in dealing with many other graph problems. Specifically …
CH Tai, PS Yu, DN Yang, MS Chen - Proceedings of the 17th ACM …, 2011 - dl.acm.org
Due to the rich information in graph data, the technique for privacy protection in published social networks is still in its infancy, as compared to the protection in relational databases. In …
Recently, a huge amount of social networks have been made publicly available. In parallel, several definitions and methods have been proposed to protect users' privacy when publicly …