dynetNLAResistance: Resisting Neighbor Label Attack in a Dynamic Network

An anonymization algorithm to resist neighbor label attack in a dynamic network.

Version: 0.1.0
Depends: R (≥ 2.10)
Imports: igraph, doParallel, foreach, grDevices, graphics, utils, parallel
Suggests: testthat
Published: 2016-11-25
DOI: 10.32614/CRAN.package.dynetNLAResistance
Author: Jiaqi Tang
Maintainer: Jiaqi Tang <1107967177 at qq.com>
License: MIT + file LICENSE
NeedsCompilation: no
Materials: README
CRAN checks: dynetNLAResistance results


Reference manual: dynetNLAResistance.pdf


Package source: dynetNLAResistance_0.1.0.tar.gz
Windows binaries: r-devel: dynetNLAResistance_0.1.0.zip, r-release: dynetNLAResistance_0.1.0.zip, r-oldrel: dynetNLAResistance_0.1.0.zip
macOS binaries: r-release (arm64): dynetNLAResistance_0.1.0.tgz, r-oldrel (arm64): dynetNLAResistance_0.1.0.tgz, r-release (x86_64): dynetNLAResistance_0.1.0.tgz, r-oldrel (x86_64): dynetNLAResistance_0.1.0.tgz


Please use the canonical form https://CRAN.R-project.org/package=dynetNLAResistance to link to this page.