Seed-Based De-Anonymizability Quantification of Social Networks
暂无分享,去创建一个
Prateek Mittal | Shouling Ji | Raheem A. Beyah | Neil Zhenqiang Gong | Weiqing Li | Prateek Mittal | N. Gong | S. Ji | Weiqing Li | R. Beyah
[1] Ben Y. Zhao,et al. Sharing graphs using differentially private graph models , 2011, IMC '11.
[2] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[3] Prateek Mittal,et al. On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge , 2015, NDSS.
[4] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[5] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[6] Mark Newman,et al. Networks: An Introduction , 2010 .
[7] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[8] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[9] Graham J. Wills,et al. NicheWorks - Interactive Visualization of Very Large Graphs , 1997, GD.
[10] Matthias Grossglauser,et al. On the performance of percolation graph matching , 2013, COSN '13.
[11] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[12] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[13] Silvio Lattanzi,et al. An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..
[14] Matthias Grossglauser,et al. On the privacy of anonymized networks , 2011, KDD.
[15] Shouling Ji,et al. Structure Based Data De-Anonymization of Social Networks and Mobility Traces , 2014, ISC.
[16] Zhe Xu,et al. Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media , 2014, Computer.
[17] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[18] Shouling Ji,et al. Structural Data De-anonymization: Quantification, Practice, and Implications , 2014, CCS.
[19] Sándor Imre,et al. Measuring importance of seeding for structural de-anonymization attacks in social networks , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[20] Ninghui Li,et al. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy , 2011, ASIACCS '12.
[21] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[22] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Yong-Yeol Ahn,et al. Community-Enhanced De-anonymization of Online Social Networks , 2014, CCS.
[24] Mauro Conti,et al. Friend in the Middle (FiM): Tackling de-anonymization in social networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[25] Sándor Imre,et al. Using Identity Separation Against De-anonymization of Social Networks , 2015, Trans. Data Priv..
[26] Ling Huang,et al. Evolution of social-attribute networks: measurements, modeling, and implications using google+ , 2012, Internet Measurement Conference.
[27] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[28] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.