COIP—Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles
暂无分享,去创建一个
[1] Daqiang Zhang,et al. CRUC: Cold-start Recommendations Using Collaborative Filtering in Internet of Things , 2013, ArXiv.
[2] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[3] Panagiotis G. Ipeirotis,et al. Quality-Based Pricing for Crowdsourced Workers , 2013 .
[4] Bo Zhao,et al. The wisdom of minority: discovering and targeting the right group of workers for crowdsourcing , 2014, WWW.
[5] Yi Li,et al. In a World That Counts: Clustering and Detecting Fake Social Engagement at Scale , 2015, WWW.
[6] Alon Y. Halevy,et al. Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.
[7] Víctor M. Eguíluz,et al. Dynamics in online social networks , 2012, ArXiv.
[8] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[9] Tom Leinster,et al. A Characterization of Entropy in Terms of Information Loss , 2011, Entropy.
[10] Barbara Carminati,et al. Network and profile based measures for user similarities on social networks , 2011, 2011 IEEE International Conference on Information Reuse & Integration.
[11] J. Wolak,et al. Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilization. , 2010, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[12] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[13] Xiao Wang,et al. Understanding Sybil Groups in the Wild , 2015, Journal of Computer Science and Technology.
[14] István Hegedüs,et al. Gossip learning with linear models on fully distributed data , 2011, Concurr. Comput. Pract. Exp..
[15] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[16] Marián Boguñá,et al. Trade-off between virality and mass media influence in the topological evolution of online social networks , 2014, ArXiv.
[17] Qishan Zhang,et al. Fast clustering-based anonymization approaches with time constraints for data streams , 2013, Knowl. Based Syst..
[18] Barbara Carminati,et al. DIVa: Decentralized identity validation for social networks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[19] Gang Wang,et al. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.
[20] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[21] Qiang Cao,et al. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.
[22] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[23] Michael Sirivianos,et al. Leveraging Social Feedback to Verify Online Identity Claims , 2014, TWEB.
[24] Moni Naor,et al. Differential privacy under continual observation , 2010, STOC '10.
[25] Jianneng Cao,et al. Publishing Microdata with a Robust Privacy Guarantee , 2012, Proc. VLDB Endow..
[26] Gang Wang,et al. Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.
[27] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[28] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[29] Markus Strohmaier,et al. Understanding the impact of socialbot attacks in online social networks , 2014, ArXiv.
[30] Barbara Carminati,et al. Graph Based Local Risk Estimation in Large Scale Online Social Networks , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).
[31] Cao Xiao,et al. Detecting Clusters of Fake Accounts in Online Social Networks , 2015, AISec@CCS.
[32] Kian-Lee Tan,et al. CASTLE: A delay-constrained scheme for ks-anonymizing data streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[33] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[34] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[35] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[36] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[37] Xiongcai Cai,et al. Collaborative Filtering for People to People Recommendation in Social Networks , 2010, Australasian Conference on Artificial Intelligence.
[38] Urs Gasser,et al. Teens, social media, and privacy , 2013 .
[39] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[40] Brendan T. O'Connor,et al. Cheap and Fast – But is it Good? Evaluating Non-Expert Annotations for Natural Language Tasks , 2008, EMNLP.
[41] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[42] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[43] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[44] S. Vijayarani,et al. Analysis of privacy preserving K-anonymity methods and techniques , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).
[45] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[46] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[47] Beng Chin Ooi,et al. CDAS: A Crowdsourcing Data Analytics System , 2012, Proc. VLDB Endow..
[48] Stathes Hadjiefthymiades,et al. Facing the cold start problem in recommender systems , 2014, Expert Syst. Appl..
[49] Ninghui Li,et al. Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy , 2011, ArXiv.
[50] Ling Huang,et al. Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN) , 2011, ArXiv.
[51] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[52] Yufei Tao,et al. Dynamic anonymization: accurate statistical analysis with privacy preservation , 2008, SIGMOD Conference.
[53] Thomas J. Carter,et al. An introduction to information theory and entropy , 2007 .
[54] Derek E. Bambauer. Privacy Versus Security , 2013 .
[55] Prateek Mittal,et al. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.
[56] Joseph S. Dumas,et al. User-based evaluations , 2002 .
[57] Christos Faloutsos,et al. CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.
[58] Narendra M. Shekokar,et al. At a Glance of Sybil Detection in OSN , 2015, 2015 IEEE International Symposium on Nanoelectronic and Information Systems.
[59] Silvio Lattanzi,et al. SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.
[60] Chris Clifton,et al. On syntactic anonymity and differential privacy , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).
[61] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[62] Gianluca Stringhini,et al. Stepping Up the Cybersecurity Game: Protecting Online Services from Malicious Activity , 2014 .
[63] Anh Duc Duong,et al. Addressing cold-start problem in recommendation systems , 2008, ICUIMC '08.
[64] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[65] Barbara Carminati,et al. Community-Based Identity Validation on Online Social Networks , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[66] Philip S. Yu,et al. Top-down specialization for information and privacy preservation , 2005, 21st International Conference on Data Engineering (ICDE'05).