A privacy self-assessment framework for online social networks
暂无分享,去创建一个
[1] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[2] Stefan Wrobel,et al. Active Hidden Markov Models for Information Extraction , 2001, IDA.
[3] Barbara Carminati,et al. Risks of Friendships on Social Networks , 2012, 2012 IEEE 12th International Conference on Data Mining.
[4] Ann Cavoukian,et al. Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..
[5] Dan Lin,et al. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2015, IEEE Transactions on Knowledge and Data Engineering.
[6] M. Premkumar,et al. Resolving Multi-party Privacy Conflicts in Social Media , 2018 .
[7] Anna Cinzia Squicciarini,et al. PriMa: a comprehensive approach to privacy protection in social network sites , 2014, Ann. des Télécommunications.
[8] Nishchol Mishra,et al. Privacy in Social Networks : A Survey , 2013 .
[9] Yang Wang,et al. VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits , 2015, CHI.
[10] T. Graepel,et al. Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.
[11] Chedy Raïssi,et al. Delineating social network data anonymization via random edge perturbation , 2012, CIKM.
[12] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[13] Quentin Jones,et al. Online Anonymity Protection in Computer-Mediated Communication , 2010, IEEE Transactions on Information Forensics and Security.
[14] Alina Campan,et al. Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.
[15] Krishna P. Gummadi,et al. You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.
[16] Andrew McCallum,et al. Reducing Labeling Effort for Structured Prediction Tasks , 2005, AAAI.
[17] Shlomo Argamon,et al. Committee-Based Sampling For Training Probabilistic Classi(cid:12)ers , 1995 .
[18] Sanjay Kumar,et al. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2016 .
[19] Jose M. Such,et al. How Socially Aware Are Social Media Privacy Controls? , 2016, Computer.
[20] Evimaria Terzi,et al. A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[21] R I M Dunbar,et al. Do online social media cut through the constraints that limit the size of offline social networks? , 2016, Royal Society Open Science.
[22] Evimaria Terzi,et al. Reconstructing Randomized Social Networks , 2010, SDM.
[23] Balachander Krishnamurthy,et al. Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..
[24] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[25] Justine Becker. Measuring privacy risk in online social networks , 2009 .
[26] William A. Gale,et al. A sequential algorithm for training text classifiers , 1994, SIGIR '94.
[27] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[28] Ahmed K. Elmagarmid,et al. Privometer: Privacy protection in social networks , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).
[29] Michael Rovatsos,et al. Privacy Policy Negotiation in Social Media , 2014, TAAS.
[30] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[31] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[32] Thomas V. Pollet,et al. Exploring variation in active network size: Constraints and ego characteristics , 2009, Soc. Networks.
[33] Barbara Carminati,et al. Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[34] Livio Bioglio,et al. Modeling the Impact of Privacy on Information Diffusion in Social Networks , 2017 .
[35] Yong Wang,et al. Social network privacy measurement and simulation , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[36] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[37] Michael Netter,et al. Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks , 2014, ArXiv.
[38] Ruggero G. Pensa,et al. A Semi-supervised Approach to Measuring User Privacy in Online Social Networks , 2016, DS.
[39] Chris Clifton,et al. A Guide to Differential Privacy Theory in Social Network Analysis , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[40] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[41] Xiaowei Ying,et al. On link privacy in randomizing social networks , 2010, Knowledge and Information Systems.
[42] Krishna P. Gummadi,et al. Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.
[43] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.
[44] Eden Litt,et al. Understanding social network site users' privacy tool use , 2013, Comput. Hum. Behav..
[45] Daniel Jackoway. Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural , 2014 .
[46] Dino Pedreschi,et al. Uncovering Hierarchical and Overlapping Communities with a Local-First Approach , 2014, TKDD.