Privacy Threat Analysis of Social Network Data
暂无分享,去创建一个
[1] J. Srivastava,et al. Data mining for social network analysis , 2008, ISI.
[2] Jon M. Kleinberg,et al. Challenges in mining social network data: processes, privacy, and paradoxes , 2007, KDD '07.
[3] James B. Williams,et al. Social networking applications in health care: threats to the privacy and security of health information , 2010, SEHC '10.
[4] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[5] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[6] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[7] Hillol Kargupta,et al. Privacy-Preserving Data Analysis on Graphs and Social Networks , 2008, Next Generation of Data Mining.
[8] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[9] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[10] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[11] Joseph Bonneau,et al. The Privacy Jungle: On the Market for Data Protection in Social Networks , 2009, WEIS.
[12] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[13] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[14] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[15] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[16] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[17] David S. Rosenblum,et al. What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.
[18] A. Felt. Privacy Protection for Social Networking APIs , 2008 .
[19] D. Watts. Networks, Dynamics, and the Small‐World Phenomenon1 , 1999, American Journal of Sociology.
[20] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.