A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse

S Zhang, Y Wang, E Luo, Q Liu, K Gu… - Journal of Systems …, 2023 - Elsevier
Intelligent identification of close friends is the mainstream approach to protect users' multi-
dimensional data in the social metaverse. It provides a fine-grained matching service for …

[PDF][PDF] 移动社交网络中基于属性加密的隐私保护方案

牛淑芬, 戈鹏, 宋蜜, 宿云 - 电子与信息学报, 2023 - jeit.ac.cn
为了保护用户在移动社交网络中的个人信息和交友偏好等隐私, 该文提出支持外包解密的基于密
文策略的属性基加密(CP-ABE) 方案. 在该方案中, 将用户的交友偏好和自我描述分别生成属性 …

Towards secure bilateral friend query with conjunctive policy matching in social networks

C Zhang, M Zhao, T Wu, W Zhang… - 2022 IEEE Intl Conf on …, 2022 - ieeexplore.ieee.org
Bilateral friend queries have attracted increasing interest in social networks, as each user
has a common requirement to specify a policy for the other. However, existing bilateral friend …

Deep joint adversarial learning for anomaly detection on attribute networks

H Fan, R Wang, X Huang, F Zhang, Z Li, S Su - Information Sciences, 2024 - Elsevier
Attribute network anomaly detection has attracted growing interest in recent years, which
aims to separate the points whose behavior is clearly different from others. The complex …

A privacy protection scheme based on attribute encryption in mobile social networks

S NIU, P GE, M SONG, Y SU - 电子与信息学报, 2023 - jeit.ac.cn
personal information and friend preferences in social networks, a Ciphertext-Policy Attribute
Based Encryption (CP-ABE) scheme that supports outsourced decryption is proposed. In this …

A Privacy-Preserving Friend Matching Scheme Based on Attribute Encryption in Mobile Social Networks

L Yu, X Nan, S Niu - Electronics, 2024 - mdpi.com
In mobile social networks, users can easily communicate with others through smart devices.
Therefore, the protection of user privacy in social networks is becoming a significant subject …

Research on Computer Network Security Protection System Based on Level Protection in Cloud Computing Environment

S Li, F Dang, Y Yang, H Liu… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
With the development of cloud computing technology, cloud services have been used by
more and more traditional applications and products because of their unique advantages …

A smart access control mechanism based on user preference in online social networks

F Shan, F Li, P Ji - Concurrency and Computation: Practice and …, 2023 - Wiley Online Library
Access control can effectively protect users' data and privacy in social networks. Different
access control models address different data privacy requirements, and the corresponding …