Fig. 1From: Understanding structure-based social network de-anonymization techniques via empirical analysisOverall architecture. As shown in Fig. 1, our analyzing architecture includes three key modules, anonymization module, de-anonymization module, configuration module, as well as two datasets, original data and anonymized dataBack to article page