Asymptotic Distribution in Undirected Finite Weighted Random Graphs with an Increasing Differentially Private Degree Sequence
Jing Luo , Hong Qin
Communications in Mathematics and Statistics ›› : 1 -17.
Asymptotic Distribution in Undirected Finite Weighted Random Graphs with an Increasing Differentially Private Degree Sequence
The asymptotic normality of the fixed number of the parameter estimators in undirected weighted networks with an increasing differentially private sequence has been established recently. In this paper, we further derive the central limit theorem for linear combinations of all the parameter estimators with an increasing differentially private sequence for undirected finite weighted network. Simulation studies are provided to illustrate the asymptotic results.
Central limit theorem / undirected finite weighted random graphs / differentially private / 62E20 / 62F12
| [1] |
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. Communications of the Acm, 54(12):p.133–141 (2011) |
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
Campan, A., Truta, T. M.: Data and structural k-anonymity in social networks. Lecture Notes in Computer Science (2008) |
| [7] |
Chatterjee, S., Diaconis, P., Sly, A.: Random graphs with a given degree sequence. The Annals of Applied Probability, pages 1400–1435 (2011) |
| [8] |
|
| [9] |
Dwork, C., M. F. N. K. , Smith, A. .Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds) Theory of Cryptography. TCC 2006. Lecture Notes in Computer Science, vol 3876. Springer, Berlin, Heidelberg. pages 265–284(2006) |
| [10] |
|
| [11] |
|
| [12] |
Hay M., Li C., M. G., D., J.: Accurate estimation of the degree distribution of private networks. In Ninth IEEE International Conference on Data Mining, pages 169–178. IEEE (2009) |
| [13] |
Hillar, C., Wibisono, A.: Maximum entropy distributions on graphs. arXiv preprint arXiv:1301.3321 (2013) |
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
Lu, W. and Miklau, G. Exponential random graph estimation under differential privacy. In proceedings of the 20th ACM SIGKDD international conference on Knowlege discovery and data mining (2014) |
| [18] |
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In In 30th IEEE symposium on Security and Privacy, pages 173–187, New York. IEEE (2009) |
| [19] |
Pan, L., Yan, T.: Asymptotics in the beta\documentclass[12pt]{minimal}\usepackage{amsmath}\usepackage{wasysym}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{amsbsy}\usepackage{mathrsfs}\usepackage{upgreek}\setlength{\oddsidemargin}{-69pt}\begin{document}$$beta$$\end{document}-model for networks with a differentially private degree sequence. Communications in Statistics - Theory and Methods (2019) |
| [20] |
Pitman, E. J. G.: Sufficient statistics and intrinsic accuracy. In Mathematical Proceedings of the cambridge Philosophical society, volume 32, pages 567–579. Cambridge Univ Press (1936) |
| [21] |
|
| [22] |
|
| [23] |
Wondracek, G., Holz, T., Kirda, E., Kruegel, C. . A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy, pages 1–15, Oakland. IEEE (2010) |
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
School of Mathematical Sciences, University of Science and Technology of China and Springer-Verlag GmbH Germany, part of Springer Nature
/
| 〈 |
|
〉 |