Fig. 2From: Understanding structure-based social network de-anonymization techniques via empirical analysisθ’s accuracy impact in Digraph_1–2. The results of θ’s accuracy impact with respect to three anonymization methods in different topologies in Digraph_1–2Back to article page