메뉴 건너뛰기




Volumn 8783, Issue , 2014, Pages 237-254

Structure based data de-anonymization of social networks and mobility traces

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS; SECURITY OF DATA;

EID: 84921353541     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-13257-0_14     Document Type: Article
Times cited : (56)

References (17)
  • 1
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography
    • Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In: WWW 2007 (2007)
    • (2007) WWW 2007
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 3
    • 84869476246 scopus 로고    scopus 로고
    • Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel
    • Srivatsa, M., Hicks, M.: Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel. In: CCS 2012 (2012)
    • (2012) CCS 2012
    • Srivatsa, M.1    Hicks, M.2
  • 4
    • 84921402137 scopus 로고    scopus 로고
    • Robust De-anonymization of Large Sparse Datasets (De-anonymizing the Netflix Prize Dataset)
    • Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets (De-anonymizing the Netflix Prize Dataset). In: S&P 2008 (2008)
    • (2008) S&P 2008
    • Narayanan, A.1    Shmatikov, V.2
  • 6
    • 85076289299 scopus 로고    scopus 로고
    • xBook: Redesigning Privacy Control in Social Networking Platforms
    • Singh, K., Bhola, S., Lee, W.: xBook: Redesigning Privacy Control in Social Networking Platforms. In: USENIX 2009 (2009)
    • (2009) USENIX 2009
    • Singh, K.1    Bhola, S.2    Lee, W.3
  • 7
    • 80755187778 scopus 로고    scopus 로고
    • “These Aren’t the Droids You’re Looking For”: Retrofitting Android to Protect Data from Imperious Applications
    • Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: “These Aren’t the Droids You’re Looking For”: Retrofitting Android to Protect Data from Imperious Applications. In: CCS 2011 (2011)
    • (2011) CCS 2011
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 8
    • 84888331381 scopus 로고    scopus 로고
    • PiOS: Detecting Privacy Leaks in iOS Applications
    • Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Applications. In: NDSS 2011 (2011)
    • (2011) NDSS 2011
    • Egele, M.1    Kruegel, C.2    Kirda, E.3    Vigna, G.4
  • 9
    • 77953537026 scopus 로고    scopus 로고
    • Node Centrality in Weighted Networks: Generalizing Degree and Shortest Paths
    • Opsahl, T., Agneessens, F., Skvoretz, J.: Node Centrality in Weighted Networks: Generalizing Degree and Shortest Paths. Social Networks 32, 245–251 (2010)
    • (2010) Social Networks , vol.32 , pp. 245-251
    • Opsahl, T.1    Agneessens, F.2    Skvoretz, J.3
  • 12
    • 84921422652 scopus 로고    scopus 로고
    • Smallblue, http://domino.research.ibm.com/comm/researchprojects.nsf/pages/smallblue.index.html
  • 14
    • 65449166085 scopus 로고    scopus 로고
    • ArnetMiner: Extraction and Mining of Academic Social Networks
    • Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: ArnetMiner: Extraction and Mining of Academic Social Networks. In: KDD 2008 (2008)
    • (2008) KDD 2008
    • Tang, J.1    Zhang, J.2    Yao, L.3    Li, J.4    Zhang, L.5    Su, Z.6
  • 16
    • 84880535160 scopus 로고    scopus 로고
    • EBM - An Entropy-Based Model to Infer Social Strength from Spatiotemporal Data
    • Pham, H., Shahabi, C., Liu, Y.: EBM - An Entropy-Based Model to Infer Social Strength from Spatiotemporal Data. In: Sigmod 2013 (2013)
    • (2013) Sigmod 2013
    • Pham, H.1    Shahabi, C.2    Liu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.