{"id":"https://openalex.org/W3159577287","doi":"https://doi.org/10.1155/2021/5518220","title":"An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks","display_name":"An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks","publication_year":2021,"publication_date":"2021-04-23","ids":{"openalex":"https://openalex.org/W3159577287","doi":"https://doi.org/10.1155/2021/5518220","mag":"3159577287"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5518220","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5518220","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5518220.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5518220.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054664175","display_name":"Haiyan Kang","orcid":"https://orcid.org/0000-0002-4348-3810"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyan Kang","raw_affiliation_strings":["Department of Information Security, Beijing Information Science and Technology University, Beijing 100192, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Beijing Information Science and Technology University, Beijing 100192, China","institution_ids":["https://openalex.org/I78675632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074008456","display_name":"Yanhang Xiao","orcid":"https://orcid.org/0000-0003-3581-5149"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Yanhang Xiao","raw_affiliation_strings":["Department of Information Security, Beijing Information Science and Technology University, Beijing 100192, China","Faculty of Engineering, University of New South Wales, Sydney 2052, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Beijing Information Science and Technology University, Beijing 100192, China","institution_ids":["https://openalex.org/I78675632"]},{"raw_affiliation_string":"Faculty of Engineering, University of New South Wales, Sydney 2052, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014017635","display_name":"Jie Yin","orcid":"https://orcid.org/0000-0002-2063-8437"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]},{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Jie Yin","raw_affiliation_strings":["Department of Information Security, Beijing Information Science and Technology University, Beijing 100192, China","School of Computer Science, University of Sydney, Sydney 2006, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Beijing Information Science and Technology University, Beijing 100192, China","institution_ids":["https://openalex.org/I78675632"]},{"raw_affiliation_string":"School of Computer Science, University of Sydney, Sydney 2006, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054664175"],"corresponding_institution_ids":["https://openalex.org/I78675632"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.363,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68681441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8704289197921753},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.6958745718002319},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6105822324752808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5291146636009216},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4966464638710022},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4850999116897583},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.45668116211891174},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4113450050354004},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35484057664871216},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.2978108823299408},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2244415283203125},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21200013160705566},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13055527210235596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8704289197921753},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.6958745718002319},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6105822324752808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5291146636009216},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4966464638710022},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4850999116897583},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.45668116211891174},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4113450050354004},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35484057664871216},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2978108823299408},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2244415283203125},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21200013160705566},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13055527210235596}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/5518220","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5518220","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5518220.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c321576d971e48eaa331a54b842643e3","is_oa":true,"landing_page_url":"https://doaj.org/article/c321576d971e48eaa331a54b842643e3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/5518220","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5518220","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5518220.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[{"id":"https://openalex.org/G5043956150","display_name":null,"funder_award_id":"20YJAZH046","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"},{"id":"https://openalex.org/G6594229490","display_name":null,"funder_award_id":"2020GJZD02","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321106","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3159577287.pdf","grobid_xml":"https://content.openalex.org/works/W3159577287.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W2056465590","https://openalex.org/W2327139569","https://openalex.org/W2395643765","https://openalex.org/W2418580550","https://openalex.org/W2614347723","https://openalex.org/W2762618237","https://openalex.org/W2957686556","https://openalex.org/W2963395938","https://openalex.org/W3010696950","https://openalex.org/W3012382439","https://openalex.org/W3111709006"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W3190678934","https://openalex.org/W4239465344","https://openalex.org/W2143186832","https://openalex.org/W2353577242","https://openalex.org/W3206885313","https://openalex.org/W4231991382","https://openalex.org/W2314542054","https://openalex.org/W4225340788","https://openalex.org/W2523585284"],"abstract_inverted_index":{"With":[0],"the":[1,4,9,44,52,61,65,71,78,81,85,99,121],"increase":[2],"of":[3,6,54,67,73,124],"number":[5],"users":[7],"in":[8,36,46],"current":[10],"social":[11,37,47],"network":[12],"platform":[13],"(taking":[14],"WeChat":[15],"as":[16],"an":[17,28],"example),":[18],"personal":[19,33],"privacy":[20,34,86,122],"security":[21],"issues":[22],"are":[23,108],"important.":[24],"This":[25],"paper":[26],"proposes":[27],"intelligent":[29,115],"detection":[30,116],"method":[31,117],"for":[32,104],"disclosure":[35],"networks.":[38],"Firstly,":[39],"we":[40,58,76],"propose":[41],"and":[42,70,88,101,106],"construct":[43],"eigenvalue":[45,62],"platform.":[48],"Secondly,":[49],"by":[50],"calculating":[51],"value":[53],"user":[55,82],"account":[56],"assets,":[57],"can":[59,118],"obtain":[60],"to":[63,97],"calculate":[64],"possibility":[66],"threat":[68],"occurrence":[69],"impact":[72],"threat.":[74],"Thirdly,":[75],"analyse":[77,120],"situation":[79],"that":[80,113],"may":[83],"leak":[84],"information":[87],"make":[89],"a":[90],"score.":[91],"Finally,":[92],"SVM":[93],"algorithm":[94],"is":[95],"used":[96],"classify":[98],"results,":[100],"some":[102],"suggestions":[103],"warning":[105],"modification":[107],"put":[109],"forward.":[110],"Experiments":[111],"show":[112],"this":[114],"effectively":[119],"leakage":[123],"individual":[125],"users.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
