A Randomized Approach for Structural and Message Based Private Friend Recommendation in Online Social Networks
暂无分享,去创建一个
[1] A. Shriram,et al. Privacy Preserving Data Mining , 2015, Advances in Information Security.
[2] Ariel J. Feldman,et al. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.
[3] Claudio Soriente,et al. Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.
[4] Peng Liu,et al. Stalking online: on user privacy in social networks , 2012, CODASPY '12.
[5] Refik Molva,et al. Analysis of Privacy in Online Social Networks from the Graph Theory Perspective , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[6] Jun Guo,et al. SFViz: interest-based friends exploration and recommendation in social networks , 2011, VINCI '11.
[7] Bi-Ru Dai,et al. A Framework of Recommendation System Based on Both Network Structure and Messages , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[8] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[9] Sushil J. Louis,et al. Friend recommendations in social networks using genetic algorithms and network topology , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).
[10] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[11] Aristides Gionis,et al. Social Network Analysis and Mining for Business Applications , 2011, TIST.
[12] Ashwin Machanavajjhala,et al. Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..
[13] Xing Xie,et al. Potential Friend Recommendation in Online Social Network , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[14] Jaime Delgado,et al. User's privacy in applications provided through social networks , 2010, WSM@MM.
[15] George D. C. Cavalcanti,et al. A graph-based friend recommendation system using Genetic Algorithm , 2010, IEEE Congress on Evolutionary Computation.
[16] Yuguang Fang,et al. A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation , 2010, 2010 Proceedings IEEE INFOCOM.
[17] B. Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2010, WOSN '09.
[18] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[19] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[20] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[21] Michael J. Muller,et al. Make new friends, but keep the old: recommending people on social networking sites , 2009, CHI.
[22] J. Srivastava,et al. Data mining for social network analysis , 2008, ISI.
[23] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[24] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[25] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[26] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[27] Shuchuan Lo,et al. WMR--A Graph-Based Algorithm for Friend Recommendation , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
[28] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[29] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[30] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[31] Edith Cohen,et al. Optimal oblivious routing in polynomial time , 2003, STOC '03.
[32] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[33] S. Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[34] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[35] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[36] Hamza Ahmed,et al. Data Mining Based Social Network Analysis from Online Behaviour , 2015 .
[37] Oded Goldreich,et al. Foundations of Cryptography: General Cryptographic Protocols , 2004 .
[38] S. Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[39] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[40] Jane G. Bensahel,et al. You Can Buy Research Dollars for Pennies , 1975, IEEE Engineering Management Review.
[41] Sharon L. Milgram,et al. The Small World Problem , 1967 .