Anonymisation in social network: a literature survey and classification
暂无分享,去创建一个
[1] Richard Han,et al. Social-K: Real-time K-anonymity guarantees for social network applications , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[2] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[3] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[4] Xiaowei Ying,et al. Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing , 2009, SNA-KDD '09.
[5] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[7] Weining Zhang,et al. Edge Anonymity in Social Network Graphs , 2009, 2009 International Conference on Computational Science and Engineering.
[8] Danfeng Yao,et al. The union-split algorithm and cluster-based anonymization of social networks , 2009, ASIACCS '09.
[9] Hong Shen,et al. On Identity Disclosure in Weighted Graphs , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.
[10] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[11] Jure Leskovec,et al. Microscopic evolution of social networks , 2008, KDD.
[12] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[13] David Hinds,et al. Social Network Structure as a Critical Success Condition for Virtual Communities , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[14] Hong Shen,et al. Anonymizing Graphs Against Weight-Based Attacks , 2010, 2010 IEEE International Conference on Data Mining Workshops.
[15] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[16] B. K. Tripathy,et al. A New Approach to Manage Security against Neighborhood Attacks in Social Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[17] Vijayalakshmi Atluri,et al. Preserving Privacy in Social Networks: A Structure-Aware Approach , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[18] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[19] Richard Han,et al. q-Anon: Rethinking Anonymity for Social Networks , 2010, 2010 IEEE Second International Conference on Social Computing.
[20] David Liben-Nowell,et al. The link-prediction problem for social networks , 2007 .
[21] Balachander Krishnamurthy,et al. Characterizing privacy in online social networks , 2008, WOSN '08.
[22] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[24] Jon M. Kleinberg,et al. Challenges in mining social network data: processes, privacy, and paradoxes , 2007, KDD '07.
[25] Ömer Egecioglu,et al. Anonymizing weighted social network graphs , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[26] Xiaowei Ying,et al. On link privacy in randomizing social networks , 2010, Knowledge and Information Systems.
[27] Blase Ur,et al. Evaluating Attack Amplification in Online Social Networks , 2009 .
[28] Tanya Y. Berger-Wolf,et al. Inferring the Maximum Likelihood Hierarchy in Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[29] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[30] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[31] Qing Zhang,et al. Anonymizing bipartite graph data using safe groupings , 2008, The VLDB Journal.
[32] Ming Gu,et al. A Brief Survey on De-anonymization Attacks in Online Social Networks , 2010, 2010 International Conference on Computational Aspects of Social Networks.
[33] Hua Wang,et al. Extended k-anonymity models against sensitive attribute disclosure , 2011, Comput. Commun..
[34] TowsleyDon,et al. Resisting structural re-identification in anonymized social networks , 2008, VLDB 2008.
[35] Yansheng Lu,et al. Preservation of Privacy in Publishing Social Network Data , 2008, 2008 International Symposium on Electronic Commerce and Security.
[36] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[37] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[38] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[39] Fredrick Mtenzi,et al. Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[40] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[41] Jure Leskovec,et al. Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.
[42] Divesh Srivastava,et al. Anonymized Data: Generation, models, usage , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[43] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[44] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[45] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.
[46] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.
[47] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[48] Jon M. Kleinberg,et al. Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.
[49] Alina Campan,et al. P-Sensitive K-Anonymity for Social Networks , 2009, DMIN.
[50] Yin Zhang,et al. Scalable proximity estimation and link prediction in online social networks , 2009, IMC '09.
[51] Lisa Singh,et al. Measuring Topological Anonymity in Social Networks , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).
[52] Ömer Egecioglu,et al. Anónimos: An LP-Based Approach for Anonymizing Weighted Social Network Graphs , 2010, IEEE Transactions on Knowledge and Data Engineering.
[53] Hillol Kargupta,et al. Privacy-Preserving Data Analysis on Graphs and Social Networks , 2008, Next Generation of Data Mining.