Research Article

[Retracted] Preserving the Privacy of Healthcare Data over Social Networks Using Machine Learning

Table 2

Comparison of detection characteristics.

Detection featureFeaturesThe essentialFeature evaluation

Attribute characteristicsUsing artificial design methods, it is easy to bypass attackers. The algorithm design is simple; the efficiency is low, the accuracy rate is relatively low, the data level is trim, and it has strict privacy protection.Breakthrough privacy protectionUncommonly used

Content characteristicsNatural language processing method is adopted, which is easy to be bypassed by attackers. In addition, the algorithm design is complicated, the efficiency is low, the accuracy rate is relatively low, the data level is significant, and the privacy protection is slight.Design complex algorithms and reasonable language modelsCommonly used

Network characteristicsAdopting complex network processing methods, not easy to be bypassed by attackers, simple algorithm design, low efficiency, relatively low accuracy rate, significant data level, and no privacy protection.Master the global structureMainstream

Activity characteristicsUsing behavioural pattern analysis and processing methods, it is not easy to bypass attackers; the algorithm design is simple, the efficiency is high, the accuracy rate is high, the data level is significant, and the privacy protection is slight.Select the most distinguishable activity informationMainstream

Auxiliary featuresUsing time-series model analysis, it is not easy to bypass attackers; the algorithm design is complex, the efficiency is high, the accuracy rate is high, the data level is trim, and it has slight privacy protection.Effective use of time dimension informationPopular