Improving Privacy in Graphs Through Node Addition
暂无分享,去创建一个
Hossein Pishro-Nik | Xiaozhe Shao | Lixin Gao | Nazanin Takbiri | Lixin Gao | H. Pishro-Nik | Xiaozhe Shao | Nazanin Takbiri
[1] Prateek Mittal,et al. Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[2] Matthias Grossglauser,et al. Growing a Graph Matching from a Handful of Seeds , 2015, Proc. VLDB Endow..
[3] Ian T. Foster,et al. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.
[4] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[5] Jon M. Kleinberg,et al. Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.
[6] Vasileios Giotsas,et al. Inferring Complex AS Relationships , 2014, Internet Measurement Conference.
[7] JU Shi-guang. Preserving privacy in social networks based on d-neighborhood subgraph anonymity , 2011 .
[8] Silvio Lattanzi,et al. An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..
[9] Matthias Grossglauser,et al. On the privacy of anonymized networks , 2011, KDD.
[10] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[11] Shouling Ji,et al. Structure Based Data De-Anonymization of Social Networks and Mobility Traces , 2014, ISC.
[12] Shouling Ji,et al. Evaluating the security of anonymized big graph/structural data , 2016 .
[13] Jon M. Kleinberg,et al. The structure of information pathways in a social communication network , 2008, KDD.
[14] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[15] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[16] Yi Wang,et al. Neighbor-specific BGP: more flexible routing policies while improving global stability , 2009, SIGMETRICS '09.
[17] Matthias Grossglauser,et al. On the performance of percolation graph matching , 2013, COSN '13.
[18] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[19] Danilo Montesi,et al. On approximate nesting of multiple social network graphs: a preliminary study , 2019, IDEAS.
[20] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[21] Daniel Cullina,et al. Improved Achievability and Converse Bounds for Erdos-Renyi Graph Matching , 2016, SIGMETRICS.
[22] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Yong-Yeol Ahn,et al. Community-Enhanced De-anonymization of Online Social Networks , 2014, CCS.
[24] Gordon T. Wilfong,et al. An analysis of BGP convergence properties , 1999, SIGCOMM '99.
[25] J. Lauri,et al. Topics in Graph Automorphisms and Reconstruction , 2003 .
[26] L. Beineke,et al. Topics in algebraic graph theory , 2004 .
[27] Wang Bo,et al. (d, k)-Anonymity for Social Networks Publication against Neighborhood Attacks , 2013 .
[28] Prateek Mittal,et al. On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge , 2015, NDSS.
[29] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[30] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[31] Lixin Gao,et al. On inferring autonomous system relationships in the Internet , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[32] Gabi Nakibly,et al. Analyzing Internet Routing Security Using Model Checking , 2015, LPAR.
[33] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[34] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[35] Ehsan Kazemi,et al. Network Alignment: Theory, Algorithms, and Applications , 2016 .
[36] Bin Wang,et al. A secure K-automorphism privacy preserving approach with high data utility in social networks , 2014, Secur. Commun. Networks.
[37] Hossein Pishro-Nik,et al. Matching Anonymized and Obfuscated Time Series to Users’ Profiles , 2017, IEEE Transactions on Information Theory.
[38] Hossein Pishro-Nik,et al. Achieving Perfect Location Privacy in Wireless Devices Using Anonymization , 2016, IEEE Transactions on Information Forensics and Security.
[39] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[40] Carey E. Priebe,et al. Seeded graph matching for correlated Erdös-Rényi graphs , 2014, J. Mach. Learn. Res..
[41] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[42] Mario Vento,et al. A large database of graphs and its use for benchmarking graph isomorphism algorithms , 2003, Pattern Recognit. Lett..
[43] Gregor Kopf. Network Routing with Path Vector Protocols: Theory and Applications , 2008 .
[44] J. Gross,et al. Graph Theory and Its Applications , 1998 .
[45] Hui Wang,et al. Symmetry in world trade network , 2009, J. Syst. Sci. Complex..
[46] Prateek Mittal,et al. Seed-Based De-Anonymizability Quantification of Social Networks , 2016, IEEE Transactions on Information Forensics and Security.
[47] Scott Shenker,et al. Privacy-Preserving Interdomain Routing at Internet Scale , 2017, Proc. Priv. Enhancing Technol..
[48] Laks V. S. Lakshmanan,et al. To do or not to do: the dilemma of disclosing anonymized data , 2005, SIGMOD '05.
[49] Bernhard Ager,et al. Policy-compliant path diversity and bisection bandwidth , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[50] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[51] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[52] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[53] Matthias Grossglauser,et al. When can two unlabeled networks be aligned under partial overlap? , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[54] Elza Erkip,et al. Seeded graph matching: Efficient algorithms and theoretical guarantees , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.
[55] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[56] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[57] Ting Wang,et al. Quantifying Graph Anonymity, Utility, and De-anonymity , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[58] Shouling Ji,et al. Structural Data De-anonymization: Quantification, Practice, and Implications , 2014, CCS.