De-anonymizing Social Networks
暂无分享,去创建一个
[1] Bpo,et al. Soziologie , 1931, Vierteljahrsschrift für wissenschaftliche Pädagogik.
[2] P. Haggett. Network Analysis In Geography , 1971 .
[3] Stanley Milgram,et al. An Experimental Study of the Small World Problem , 1969 .
[4] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[5] Norman T. J. Bailey,et al. The Mathematical Theory of Infectious Diseases , 1975 .
[6] Mark S. Granovetter. Economic Action and Social Structure: The Problem of Embeddedness , 1985, American Journal of Sociology.
[7] P. Bonacich. Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.
[8] Robin I. M. Dunbar. Neocortex size as a constraint on group size in primates , 1992 .
[9] Graham J. Wills,et al. NicheWorks - Interactive Visualization of Very Large Graphs , 1997, GD.
[10] Graham J. Wills. NicheWorks—Interactive Visualization of Very Large Graphs , 1999 .
[11] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[12] Thomas de Quincey. [C] , 2000, The Works of Thomas De Quincey, Vol. 1: Writings, 1799–1820.
[13] R. Hanneman. Introduction to Social Network Methods , 2001 .
[14] Hhs Office for Civil Rights. Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.
[15] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[16] P. Bearman,et al. Chains of Affection: The Structure of Adolescent Romantic and Sexual Networks1 , 2004, American Journal of Sociology.
[17] Andrew S. Tanenbaum,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.
[18] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[19] G. DeFriese,et al. The New York Times , 2020, Publishing for Libraries.
[20] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[21] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[22] Philippe Golle,et al. Private social network analysis: how to assemble pieces of a graph privately , 2006, WPES '06.
[23] M. Consalvo,et al. Fono, David, and Raynes-Goldie, Kate. . Hyperfriends and Beyond: Friendship and Social Norms on LiveJournal. , 2006 .
[24] Sougata Mukherjea,et al. On the structural properties of massive telecom call graphs: findings and implications , 2006, CIKM '06.
[25] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[26] A-L Barabási,et al. Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.
[27] ジェレマイア・ハームセン,et al. Network node ad targeting , 2007 .
[28] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[29] Jon M. Kleinberg,et al. The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..
[30] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[31] K. Swallen,et al. The National Longitudinal Study of Adolescent Health Overweight, Obesity, and Health-Related Quality of Life Among Adolescents: , 2007 .
[32] Miklos Kurucz,et al. Spectral clustering in telephone call graphs , 2007, WebKDD/SNA-KDD '07.
[33] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[34] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[35] Etienne Huens,et al. Geographical dispersal of mobile communication networks , 2008, 0802.2178.
[36] Ben Laurie,et al. Under)mining Privacy in Social Networks , 2008 .
[37] Marco Gonzalez,et al. Author's Personal Copy Social Networks Tastes, Ties, and Time: a New Social Network Dataset Using Facebook.com , 2022 .
[38] Trevor Darrell,et al. Autotagging Facebook: Social network context improves photo annotation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[39] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[40] Andreas Schaad,et al. Privacy-preserving social network analysis for criminal investigations , 2008, WPES '08.
[41] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, ICDE.
[42] Gayatri Swamynathan,et al. Do social networks improve e-commerce?: a study on social marketplaces , 2008, WOSN '08.
[43] Jon M. Kleinberg,et al. Feedback effects between similarity and social influence in online communities , 2008, KDD.
[44] Ravi Kumar,et al. Influence and correlation in social networks , 2008, KDD.
[45] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[46] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[47] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[48] Aidong Zhang,et al. Bridging centrality: graph mining from element level to group level , 2008, KDD.
[49] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[50] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[51] Balachander Krishnamurthy,et al. Characterizing privacy in online social networks , 2008, WOSN '08.
[52] Jon M. Kleinberg,et al. The structure of information pathways in a social communication network , 2008, KDD.
[53] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[54] A. Felt. Privacy Protection for Social Networking APIs , 2008 .
[55] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[56] Christos Faloutsos,et al. Weighted graphs and disconnected components: patterns and a generator , 2008, KDD.
[57] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[58] H. Elsheshtawy,et al. Personal Information Protection and Electronic Documents Act , 2015 .
[59] George Danezis,et al. Prying Data out of a Social Network , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[60] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.