Research Article
Cross-Platform Strong Privacy Protection Mechanism for Review Publication
Table 4
The privacy leakage level and attributes that the adversary can obtain in different levels.
| | Level | Attributes that the adversary can obtain |
| | 0 | None | | 1 | Display name, avatar | | 2 | Display name, avatar, real photo, name | | 3 | Attributes involved in level 2 and associate them with the user’s attributes across other social networks to determine gender, age, or location | | 4 | Attributes involved in level 3, education background | | 5 | Attributes involved in level 4, organization, contact information, home address |
|
|