Using Identity Separation Against De-anonymization of Social Networks
暂无分享,去创建一个
[1] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[2] Danqi Chen,et al. De-anonymizing social networks , 2012 .
[3] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[4] Anupam Joshi,et al. @i seek 'fb.me': identifying users across multiple online social networks , 2013, WWW.
[5] Sree Hari Krishnan Parthasarathi,et al. Exploiting innocuous activity for correlating users across sites , 2013, WWW.
[6] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[7] Sándor Imre,et al. Measuring importance of seeding for structural de-anonymization attacks in social networks , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[8] Sándor Imre,et al. Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation , 2013, Communications and Multimedia Security.
[9] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[10] Matthias Grossglauser,et al. A Bayesian method for matching two similar graphs without seeds , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[12] Róbert Schulcz,et al. Modeling Role-Based Privacy in Social Networking Services , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[13] Dogan Kesdogan,et al. Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.
[14] Markulf Kohlweiss,et al. Scramble! Your Social Network Data , 2011, PETS.
[15] Bartunov Sergey,et al. Joint Link-Attribute User Identity Resolution in Online Social Networks , 2012 .
[16] Mauro Conti,et al. Friend in the Middle (FiM): Tackling de-anonymization in social networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[17] Jie Wu,et al. Seed and Grow: An attack against anonymized social networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[18] Sándor Imre,et al. Measuring Local Topological Anonymity in Social Networks , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.
[19] Elaine Shi,et al. Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge , 2011, The 2011 International Joint Conference on Neural Networks.
[20] Spearman ’ s rank correlation , .
[21] Ronald E. Leenes,et al. Audience Segregation in Social Network Sites , 2010, 2010 IEEE Second International Conference on Social Computing.
[22] Ronald E. Leenes,et al. Keeping Up Appearances: Audience Segregation in Social Network Sites , 2011, Computers, Privacy and Data Protection.
[23] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.