Research Article
Cross-Platform Strong Privacy Protection Mechanism for Review Publication
Table 4
The privacy leakage level and attributes that the adversary can obtain in different levels.
| Level | Attributes that the adversary can obtain |
| 0 | None | 1 | Display name, avatar | 2 | Display name, avatar, real photo, name | 3 | Attributes involved in level 2 and associate them with the user’s attributes across other social networks to determine gender, age, or location | 4 | Attributes involved in level 3, education background | 5 | Attributes involved in level 4, organization, contact information, home address |
|
|