Friend in the Middle (FiM): Tackling de-anonymization in social networks
暂无分享,去创建一个
[1] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[2] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[3] Yvo Desmedt,et al. Your Facebook deactivated friend or a cloaked spy , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[4] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[5] Refik Molva,et al. Safebook: A distributed privacy preserving Online Social Network , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[6] Claudio Soriente,et al. Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Hakim Hacid,et al. Towards multiple identity detection in social networks , 2012, WWW.
[9] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[10] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[11] Dogan Kesdogan,et al. Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.
[12] Behram F. T. Mistree,et al. Gaydar: Facebook Friendships Expose Sexual Orientation , 2009, First Monday.
[13] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[14] Mauro Conti,et al. FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[15] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[16] Elaine Shi,et al. Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge , 2011, The 2011 International Joint Conference on Neural Networks.
[17] Dan Boneh,et al. Evading Censorship with Browser-Based Proxies , 2012, Privacy Enhancing Technologies.
[18] Mauro Conti,et al. Virtual private social networks , 2011, CODASPY '11.
[19] Hassan Takabi,et al. Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.
[20] Qi Xie,et al. FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[21] Markulf Kohlweiss,et al. Scramble! Your Social Network Data , 2011, PETS.