From: Understanding structure-based social network de-anonymization techniques via empirical analysis
DA approach | Vulnerable Anonymization Method | Performance | Category | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Edge-edit | k-Anony. | U-Split | Para.-free | Scalable | Practical | Robust | I | II | III | IV | |
Backstrom et al. [11] | × | × | × | √ | × | ∙ | × | √ | |||
N-DA. [4] | √ | ∙ | ∙ | × | √ | √ | √ | √ | |||
Srivatsa et al.-DV [5] | √ | ∙ | ∙ | √ | ∙ | ∙ | √ | √ | |||
Nilizadeh et al. [19] | ∙ | ∙ | ∙ | × | ∙ | ∙ | ∙ | √ | |||
Ji-DA [37] | √ | ∙ | ∙ | × | √ | √ | √ | √ | |||
Ji-ADA [37] | √ | ∙ | ∙ | × | √ | √ | √ | √ | |||
Ji-ODA [38] | √ | ∙ | ∙ | × | √ | √ | √ | √ | |||
Chen et al. [42] | √ | ∙ | ∙ | √ | √ | √ | √ | √ | |||
Ji-DeSAG [28] | √ | ∙ | ∙ | × | √ | √ | √ | √ |