Top Location Anonymization for Geosocial Network Datasets
暂无分享,去创建一个
[1] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[2] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[3] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[4] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[5] Cecilia Mascolo,et al. An Empirical Study of Geographic User Activity Patterns in Foursquare , 2011, ICWSM.
[6] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[7] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[8] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[9] Xiaowei Ying,et al. Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing , 2009, SNA-KDD '09.
[10] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[11] Hui Zang,et al. Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.
[12] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[13] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[14] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[15] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[16] Danfeng Yao,et al. The union-split algorithm and cluster-based anonymization of social networks , 2009, ASIACCS '09.
[17] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.