Research Article
Research on Information Leakage Tracking Algorithms in Online Social Networks
Table 2
Summary of paths within three hops.
| | Path 1 | Path 2 | Path 3 | Path 4 |
| Node B | B—D | B—C—D | B—A—C—D | No | Node K | K—D | K—F—D | K—I—F—D | K—H—E—D | Node P | No | No | No | No | Node Q | Q—C—D | Q—C—B—D | No | No | Node V | V—u—B—D | V—A—B—D | V—A—C—D | No |
|
|