Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Graph theory: A comprehensive survey about graph theory applications in computer science and social networks

A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …

[HTML][HTML] A survey of privacy-preserving mechanisms for heterogeneous data types

M Cunha, R Mendes, JP Vilela - Computer science review, 2021 - Elsevier
Due to the pervasiveness of always connected devices, large amounts of heterogeneous
data are continuously being collected. Beyond the benefits that accrue for the users, there …

Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks

RK Langari, S Sardar, SAA Mousavi… - Expert Systems with …, 2020 - Elsevier
In recent years, an explosive growth of social networks has been made publicly available for
understanding the behavior of users and data mining purposes. The main challenge in …

Fairsna: Algorithmic fairness in social network analysis

A Saxena, G Fletcher, M Pechenizkiy - ACM Computing Surveys, 2024 - dl.acm.org
In recent years, designing fairness-aware methods has received much attention in various
domains, including machine learning, natural language processing, and information …

Private graph data release: A survey

Y Li, M Purcell, T Rakotoarivelo, D Smith… - ACM Computing …, 2023 - dl.acm.org
The application of graph analytics to various domains has yielded tremendous societal and
economical benefits in recent years. However, the increasingly widespread adoption of …

Privacy preservation in online social networks using multiple-graph-properties-based clustering to ensure k-anonymity, l-diversity, and t-closeness

R Gangarde, A Sharma, A Pawar, R Joshi, S Gonge - Electronics, 2021 - mdpi.com
As per recent progress, online social network (OSN) users have grown tremendously
worldwide, especially in the wake of the COVID-19 pandemic. Today, OSNs have become a …

[HTML][HTML] A survey of parameterized algorithms and the complexity of edge modification

C Crespelle, PG Drange, FV Fomin… - Computer Science Review, 2023 - Elsevier
The survey is a comprehensive overview of the developing area of parameterized
algorithms for graph modification problems. It describes state of the art in kernelization …

[PDF][PDF] A study on k-anonymity, l-diversity, and t-closeness techniques

K Rajendran, M Jayabalan, ME Rana - IJCSNS, 2017 - researchgate.net
In today's world, most organizations are facing data accumulation in massive amounts and
storing them in large databases. Myriad of them, the particular healthcare industry has …

A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022 - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …