Research Article
Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks
Figure 3
The influence based on ICM under high degree attack model in the Facebook network. (a) Not attacked, (b) the attacked set size is 50% of the seed set size, (c) the attacked set size is 70% of the seed set size, and (d) the attacked set size is 90% of the seed set size.
(a) |
(b) |
(c) |
(d) |