Hangar 发表于 2025-3-23 11:52:53

Preserving the ,-Reachability When Anonymizing Social Networks, and keep it unchanged during anonymization. We show that .-RPA can efficiently find such a subgraph and anonymize the releasing graph with low information loss. Extensive experiments on real datasets illustrate that anonymized social networks generated by our method can be used to answer .-reachable queries with high accuracy.

Vital-Signs 发表于 2025-3-23 15:34:02

Preserving the ,-Reachability When Anonymizing Social Networks, and keep it unchanged during anonymization. We show that .-RPA can efficiently find such a subgraph and anonymize the releasing graph with low information loss. Extensive experiments on real datasets illustrate that anonymized social networks generated by our method can be used to answer .-reachable queries with high accuracy.

Plaque 发表于 2025-3-23 20:06:51

http://reply.papertrans.cn/103/10218/1021721/1021721_13.png

蚀刻 发表于 2025-3-23 23:56:45

Personalized Location Anonymity - A Kernel Density Estimation Approache selected based on both the entropy of personal visit probability and the area of Cloaking Region (CR). We conduct extensive experiments on the real dataset to verify the performance of privacy protection degree, where the privacy properties are measured by the location information entropy and the area of CR.

冥想后 发表于 2025-3-24 02:23:11

Detecting Data-model-oriented Anomalies in Parallel Business Processallel-process model and the data model. Then, an anomaly detection method under the divide-and-conquer framework is proposed to ensure efficiency in detecting anomalies in business processes. Both theoretical analysis and experimental results prove this method to be highly efficient and effective in detecting data model oriented anomalies.

Incorporate 发表于 2025-3-24 07:57:13

Detecting Data-model-oriented Anomalies in Parallel Business Processallel-process model and the data model. Then, an anomaly detection method under the divide-and-conquer framework is proposed to ensure efficiency in detecting anomalies in business processes. Both theoretical analysis and experimental results prove this method to be highly efficient and effective in detecting data model oriented anomalies.

Presbycusis 发表于 2025-3-24 12:52:02

Learning User Credibility on Aspects from Review Textse aspect ratings are assigned by mining semantic polarity. Then, an iteration algorithm is designed for estimating credibilities by considering the consistency between individual ratings and overall ratings on aspects. Finally, experiments on the real dataset demonstrate that our method outperforms baseline systems.

terazosin 发表于 2025-3-24 15:22:09

Learning User Credibility on Aspects from Review Textse aspect ratings are assigned by mining semantic polarity. Then, an iteration algorithm is designed for estimating credibilities by considering the consistency between individual ratings and overall ratings on aspects. Finally, experiments on the real dataset demonstrate that our method outperforms baseline systems.

agglomerate 发表于 2025-3-24 22:15:02

http://reply.papertrans.cn/103/10218/1021721/1021721_19.png

Herpetologist 发表于 2025-3-25 00:44:32

http://reply.papertrans.cn/103/10218/1021721/1021721_20.png
页: 1 [2] 3 4 5 6 7 8
查看完整版本: Titlebook: Web-Age Information Management; 17th International C Bin Cui,Nan Zhang,Dexi Liu Conference proceedings 2016 Springer International Publishi