Individual privacy in social influence networks
暂无分享,去创建一个
[1] Jinhui Tang,et al. Online Topic-Aware Influence Maximization , 2015, Proc. VLDB Endow..
[2] Laks V. S. Lakshmanan,et al. Viral Marketing Meets Social Advertising: Ad Allocation with Minimum Regret , 2014, Proc. VLDB Endow..
[3] Sofya Raskhodnikova,et al. Private analysis of graph structure , 2011, Proc. VLDB Endow..
[4] Hui Liu,et al. An Efficient Method for Topic-Aware Influence Maximization , 2014, APWeb.
[5] Qian Xiao,et al. Differentially private network data release via structural inference , 2014, KDD.
[6] Elad Yom-Tov,et al. Linguistic Factors Associated With Propagation of Political Opinions in Twitter , 2014 .
[7] Yannis Sismanis,et al. Scalable topic-specific influence analysis on microblogs , 2014, WSDM.
[8] Mason A. Porter,et al. Multilayer networks , 2013, J. Complex Networks.
[9] Bing-Rong Lin,et al. Information preservation in statistical privacy and bayesian estimation of unattributed histograms , 2013, SIGMOD '13.
[10] Shuigeng Zhou,et al. Recursive mechanism: towards node differential privacy and unrestricted joins , 2013, SIGMOD '13.
[11] Sofya Raskhodnikova,et al. Analyzing Graphs with Node Differential Privacy , 2013, TCC.
[12] Rossano Schifanella,et al. The role of information diffusion in the evolution of social networks , 2013, KDD.
[13] Nicola Barbieri,et al. Topic-aware social influence propagation models , 2012, Knowledge and Information Systems.
[14] Tamir Tassa,et al. Injecting Uncertainty in Graphs for Identity Obfuscation , 2012, Proc. VLDB Endow..
[15] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[16] Aristides Gionis,et al. Sparsification of influence networks , 2011, KDD.
[17] Tamir Tassa,et al. Identity obfuscation in graphs through the information theoretic lens , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[18] Jon Kleinberg,et al. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter , 2011, WWW.
[19] Elena Ferrari,et al. Analyzing Private Network Data , 2010 .
[20] Elena Ferrari,et al. Issues with Privacy Preservation in Query Log Mining , 2010 .
[21] Jiawei Han,et al. Mining topic-level influence in heterogeneous networks , 2010, CIKM.
[22] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[23] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[24] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[25] Balachander Krishnamurthy,et al. Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..
[26] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[27] Jimeng Sun,et al. Social influence analysis in large-scale networks , 2009, KDD.
[28] Dan Suciu,et al. Boosting the accuracy of differentially private histograms through consistency , 2009, Proc. VLDB Endow..
[29] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.
[30] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[31] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[32] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[33] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[34] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.
[35] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[36] Tamir Tassa,et al. Privacy Preserving Estimation of Social Influence , 2014, EDBT.
[37] Nicola Barbieri,et al. Online Topic-aware Influence Maximization Queries , 2014, EDBT.
[38] Nicola Barbieri,et al. Influence Maximization with Viral Product Design , 2014, SDM.
[39] Izzeddin Gür,et al. BROKER-BASED AD ALLOCATION IN SOCIAL NETWORKS A THESIS SUBMITTED TO THE DEPARTMENT OF COMPUTER ENGINEERING AND THE GRADUATE SCHOOL OF ENGINEERING AND SCIENCE OF BILKENT UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE , 2013 .
[40] Lei Chen,et al. A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.
[41] Xiaowei Ying,et al. Graph Generation with Prescribed Feature Constraints , 2009, SDM.
[42] Jie Wang,et al. Privacy Preservation in Social Networks with Sensitive Edge Weights , 2009, SDM.
[43] Gemma C. Garriga,et al. Randomization Techniques for Graphs , 2009, SDM.
[44] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[45] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .