Interest-driven private friend recommendation
暂无分享,去创建一个
[1] Oded Goldreich. Foundations of Cryptography: Encryption Schemes , 2004 .
[2] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[3] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[4] Refik Molva,et al. Analysis of Privacy in Online Social Networks from the Graph Theory Perspective , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[5] Dinan Gunawardena,et al. Social tags: meaning and suggestions , 2008, CIKM '08.
[6] Aristides Gionis,et al. Social Network Analysis and Mining for Business Applications , 2011, TIST.
[7] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[8] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[9] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[10] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[11] Donna M. Ehrlich. Social network survey paper , 2006 .
[12] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[13] Chris Clifton,et al. AC-Framework for Privacy-Preserving Collaboration , 2007, SDM.
[14] Wesley W. Chu,et al. A Social Network-Based Recommender System (SNRS) , 2010, Data Mining for Social Network Data.
[15] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[16] Bernardo A. Huberman,et al. Predicting the Future with Social Media , 2010, Web Intelligence.
[17] Ashwin Machanavajjhala,et al. Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..
[18] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[19] Jing Wang,et al. TagNetLens: multiscale visualization of knowledge structures in social tags , 2010, VINCI '10.
[20] Xing Xie,et al. Potential Friend Recommendation in Online Social Network , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[21] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[22] Chris Clifton,et al. Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.
[23] Jaime Delgado,et al. User's privacy in applications provided through social networks , 2010, WSM@MM.
[24] Peng Liu,et al. Stalking online: on user privacy in social networks , 2012, CODASPY '12.
[25] Michael J. Muller,et al. Make new friends, but keep the old: recommending people on social networking sites , 2009, CHI.
[26] Chris Clifton,et al. Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[27] Jon Kleinberg,et al. KDD '07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining , 2007, KDD 2007.
[28] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[29] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[30] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[31] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[32] Balachander Krishnamurthy,et al. Characterizing privacy in online social networks , 2008, WOSN '08.
[33] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[34] Wei Jiang,et al. Structural and Message Based Private Friend Recommendation , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[35] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, ICDE.
[36] Wei Jiang,et al. N-Gram Based Secure Similar Document Detection , 2011, DBSec.
[37] David Liben-Nowell,et al. The link-prediction problem for social networks , 2007 .
[38] Vijay V. Raghavan,et al. Proceedings: 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology—Workshops , 2010 .
[39] Edgar R. Weippl,et al. Cheap and automated socio-technical attacks based on social networking sites , 2010, AISec '10.
[40] Michael R. Lyu,et al. Improving Recommender Systems by Incorporating Social Contextual Information , 2011, TOIS.
[41] J. Shane Culpepper,et al. Efficient set intersection for inverted indexing , 2010, TOIS.
[42] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[43] Keith W. Ross,et al. Facebook users have become much more private: A large-scale study , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[44] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[45] George D. C. Cavalcanti,et al. A graph-based friend recommendation system using Genetic Algorithm , 2010, IEEE Congress on Evolutionary Computation.
[46] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[47] Chris Clifton,et al. Transforming Semi-Honest Protocols to Ensure Accountability , 2006, ICDM Workshops.
[48] Shuchuan Lo,et al. WMR--A Graph-Based Algorithm for Friend Recommendation , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
[49] Jun Guo,et al. SFViz: interest-based friends exploration and recommendation in social networks , 2011, VINCI '11.
[50] Oded Goldreich,et al. Foundations of Cryptography: General Cryptographic Protocols , 2004 .
[51] Bi-Ru Dai,et al. A Framework of Recommendation System Based on Both Network Structure and Messages , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[52] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[53] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[54] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[55] Jon M. Kleinberg,et al. Challenges in mining social network data: processes, privacy, and paradoxes , 2007, KDD '07.
[56] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[57] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[58] David M. Nicol,et al. unFriendly: Multi-party Privacy Risks in Social Networks , 2010, Privacy Enhancing Technologies.
[59] Sushil J. Louis,et al. Friend recommendations in social networks using genetic algorithms and network topology , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).
[60] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.