General Graph Data De-Anonymization
暂无分享,去创建一个
Shouling Ji | Raheem A. Beyah | Mudhakar Srivatsa | Jing He | Weiqing Li | S. Ji | Weiqing Li | R. Beyah | M. Srivatsa | Jing He
[1] Pan Hui,et al. CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .
[2] Shouling Ji,et al. Structural Data De-anonymization: Quantification, Practice, and Implications , 2014, CCS.
[3] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[4] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[5] Ling Huang,et al. Evolution of social-attribute networks: measurements, modeling, and implications using google+ , 2012, Internet Measurement Conference.
[6] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[7] Alina Campan,et al. Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.
[8] Hong Cheng,et al. Graph Clustering Based on Structural/Attribute Similarities , 2009, Proc. VLDB Endow..
[9] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[10] Jie Tang,et al. ArnetMiner: extraction and mining of academic social networks , 2008, KDD.
[11] John Skvoretz,et al. Node centrality in weighted networks: Generalizing degree and shortest paths , 2010, Soc. Networks.
[12] Yannick Rochat,et al. Closeness Centrality Extended to Unconnected Graphs: the Harmonic Centrality Index , 2009 .
[13] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[14] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[15] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[16] Michael C. Hout,et al. Multidimensional Scaling , 2003, Encyclopedic Dictionary of Archaeology.
[17] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[18] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[19] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[20] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[21] Subhash C. Basak,et al. Determining structural similarity of chemicals using graph-theoretic indices , 1988, Discret. Appl. Math..
[22] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[24] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[25] Ling Huang,et al. Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN) , 2011, ArXiv.
[26] Prateek Mittal,et al. SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization , 2015, USENIX Security Symposium.
[27] Alex Bavelas,et al. Communication Patterns in Task‐Oriented Groups , 1950 .
[28] Sebastiano Vigna,et al. Axioms for Centrality , 2013, Internet Math..
[29] Yong-Yeol Ahn,et al. Community-Enhanced De-anonymization of Online Social Networks , 2014, CCS.
[30] Saleem N. Bhatti,et al. CRAWDAD dataset st_andrews/sassy (v.2011-06-03) , 2011 .
[31] Mark Newman,et al. Networks: An Introduction , 2010 .
[32] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[33] Prateek Mittal,et al. On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge , 2015, NDSS.
[34] Ulrik Brandes,et al. Structural Similarity in Graphs (A Relaxation Approach for Role Assignment) , 2004, ISAAC.
[35] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[36] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[37] Wenke Lee,et al. xBook: Redesigning Privacy Control in Social Networking Platforms , 2009, USENIX Security Symposium.
[38] Silvio Lattanzi,et al. SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.
[39] Manuj Garg,et al. Axiomatic Foundations of Centrality in Networks , 2009 .