Privacy Threat Analysis of Mobile Social Network Data Publishing
暂无分享,去创建一个
[1] Jemal H. Abawajy,et al. Utility-aware social network graph anonymization , 2015, J. Netw. Comput. Appl..
[2] Jemal H. Abawajy,et al. Vertex re‐identification attack using neighbourhood‐pair properties , 2016, Concurr. Comput. Pract. Exp..
[3] Jemal H. Abawajy,et al. Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Jemal H. Abawajy,et al. Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.
[5] Jemal H. Abawajy,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..
[6] Arun Kumar Sangaiah,et al. CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks , 2017, Future Gener. Comput. Syst..
[7] Markus Endler,et al. Situation-based privacy autonomous management for mobile social networks , 2017, Comput. Commun..
[8] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..
[9] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[10] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[11] Jemal H. Abawajy,et al. Privacy Threat Analysis of Social Network Data , 2011, ICA3PP.
[12] Jemal H. Abawajy,et al. Preserving Utility in Social Network Graph Anonymization , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.