De-anonymizing social networks and inferring private attributes using knowledge graphs
暂无分享,去创建一个
Xiang-Yang Li | Linlin Chen | Chunhong Zhang | Jianwei Qian | Xiangyang Li | Jianwei Qian | Chunhong Zhang | Linlin Chen | Xiang-Yang Li | Jianwei Qian | Chunhong Zhang
[1] Xiang-Yang Li,et al. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2016, IEEE Transactions on Information Forensics and Security.
[2] Robert Preis,et al. Linear Time 1/2-Approximation Algorithm for Maximum Weighted Matching in General Graphs , 1999, STACS.
[3] Jie Wu,et al. Outsourcing privacy-preserving social networks to a cloud , 2013, 2013 Proceedings IEEE INFOCOM.
[4] Ben Y. Zhao,et al. Sharing graphs using differentially private graph models , 2011, IMC '11.
[5] Zhe Xu,et al. Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media , 2014, Computer.
[6] Wei Zhang,et al. Knowledge vault: a web-scale approach to probabilistic knowledge fusion , 2014, KDD.
[7] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[8] Jie Wu,et al. A Two-Stage Deanonymization Attack against Anonymized Social Networks , 2014, IEEE Transactions on Computers.
[9] Robert E. Tarjan,et al. Improved Algorithms for Bipartite Network Flow , 1994, SIAM J. Comput..
[10] Claudia Eckert,et al. Flash: Efficient, Stable and Optimal K-Anonymity , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[11] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[12] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[13] Matthias Grossglauser,et al. A Bayesian method for matching two similar graphs without seeds , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[14] Jing Zhao,et al. Achieving differential privacy of data disclosure in the smart grid , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[15] Michele Garetto,et al. De-anonymizing scale-free social networks by percolation graph matching , 2014, 2015 IEEE Conference on Computer Communications (INFOCOM).
[16] Lise Getoor,et al. Knowledge Graph Identification , 2013, SEMWEB.
[17] Silvio Lattanzi,et al. An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..
[18] Xiang-Yang Li,et al. Graph-based privacy-preserving data publication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[19] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[20] Philip S. Yu,et al. Privacy-preserving social network publication against friendship attacks , 2011, KDD.
[21] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[22] Yong-Yeol Ahn,et al. Community-Enhanced De-anonymization of Online Social Networks , 2014, CCS.
[23] Shouling Ji,et al. Structure Based Data De-Anonymization of Social Networks and Mobility Traces , 2014, ISC.
[24] Sharon Goldberg,et al. Calibrating Data to Sensitivity in Private Data Analysis , 2012, Proc. VLDB Endow..
[25] Xiang-Yang Li,et al. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2015, IEEE Trans. Inf. Forensics Secur..
[26] Philip S. Yu,et al. Structural Diversity for Privacy in Publishing Social Networks , 2011, SDM.
[27] Xiang-Yang Li,et al. Predicting the influencers on wireless subscriber churn , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[28] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[29] Xiang-Yang Li,et al. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.
[30] Shouling Ji,et al. Structural Data De-anonymization: Quantification, Practice, and Implications , 2014, CCS.
[31] Prateek Mittal,et al. On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge , 2015, NDSS.
[32] Shaojie Tang,et al. A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[33] Dawn Xiaodong Song,et al. Preserving Link Privacy in Social Network Based Systems , 2012, NDSS.
[34] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[35] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[36] Sean Chester,et al. Complexity of social network anonymization , 2012, Social Network Analysis and Mining.
[37] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[38] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[39] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[40] Tom M. Mitchell,et al. Random Walk Inference and Learning in A Large Scale Knowledge Base , 2011, EMNLP.
[41] Matthias Grossglauser,et al. On the performance of percolation graph matching , 2013, COSN '13.
[42] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[43] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.