메뉴 건너뛰기




Volumn 2016-July, Issue , 2016, Pages

De-anonymizing social networks and inferring private attributes using knowledge graphs

Author keywords

Attack and privacy preservation; Knowledge graph; Social network data publishing

Indexed keywords

DATA PRIVACY; GRAPHIC METHODS; SEMANTICS;

EID: 84983364700     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2016.7524578     Document Type: Conference Paper
Times cited : (82)

References (47)
  • 1
    • 84983280517 scopus 로고    scopus 로고
    • Minimum cost flow algorithm, https://github.com/nikhilgarg28/libalgo/ blob/master/MinCostFlow.java.
    • Minimum Cost Flow Algorithm
  • 4
    • 0028518325 scopus 로고
    • Improved algorithms for bipartite network flow
    • AHUJA, R. K., ORLIN, J. B., STEIN, C., AND TARJAN, R. E. Improved algorithms for bipartite network flow. SICOMP 23, 5 (1994), 906-933.
    • (1994) SICOMP , vol.23 , Issue.5 , pp. 906-933
    • Ahuja, R.K.1    Orlin, J.B.2    Stein, C.3    Tarjan, R.E.4
  • 5
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • BACKSTROM, L., DWORK, C., AND KLEINBERG, J. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In ACM WWW (2007), pp. 181-190.
    • (2007) ACM WWW , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 6
    • 77954728128 scopus 로고    scopus 로고
    • K-isomorphism: Privacy preserving network publication against structural attacks
    • CHENG, J., FU, A. W.-C., AND LIU, J. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD (2010), ACM, pp. 459-470.
    • SIGMOD (2010), ACM , pp. 459-470
    • Cheng, J.1    Fu, A.W.-C.2    Liu, J.3
  • 7
    • 84904006029 scopus 로고    scopus 로고
    • Complexity of social network anonymization
    • CHESTER, S., KAPRON, B. M., SRIVASTAVA, G., AND VENKATESH, S. Complexity of social network anonymization. SNAM 3, 2 (2013), 151-166.
    • (2013) SNAM , vol.3 , Issue.2 , pp. 151-166
    • Chester, S.1    Kapron, B.M.2    Srivastava, G.3    Venkatesh, S.4
  • 10
    • 33749016498 scopus 로고    scopus 로고
    • Information revelation and privacy in online social networks
    • GROSS, R., AND ACQUISTI, A. Information revelation and privacy in online social networks. In WPES (2005), ACM, pp. 71-80.
    • WPES (2005), ACM , pp. 71-80
    • Gross, R.1    Acquisti, A.2
  • 11
    • 84859194833 scopus 로고    scopus 로고
    • Resisting structural re-identification in anonymized social networks
    • HAY, M., MIKLAU, G., JENSEN, D., TOWSLEY, D., AND WEIS, P. Resisting structural re-identification in anonymized social networks. PVLDB 1, 1 (2008), 102-114.
    • (2008) PVLDB , vol.1 , Issue.1 , pp. 102-114
    • Hay, M.1    Miklau, G.2    Jensen, D.3    Towsley, D.4    Weis, P.5
  • 13
    • 85029362126 scopus 로고
    • Knowledge graphs
    • JAMES, P. Knowledge graphs. Order 501 (1992), 6439.
    • (1992) Order , vol.501 , pp. 6439
    • James, P.1
  • 14
    • 84969960836 scopus 로고    scopus 로고
    • On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge
    • JI, S., LI, W., GONG, N. Z., MITTAL, P., AND BEYAH, R. On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge. NDSS (2015).
    • (2015) NDSS
    • Ji, S.1    Li, W.2    Gong, N.Z.3    Mittal, P.4    Beyah, R.5
  • 15
    • 84910612222 scopus 로고    scopus 로고
    • Structural data de-anonymization: Quantification, practice, and implications
    • JI, S., LI, W., SRIVATSA, M., AND BEYAH, R. Structural data de-anonymization: Quantification, practice, and implications. In ACM CCS (2014), pp. 1040-1053.
    • (2014) ACM CCS , pp. 1040-1053
    • Ji, S.1    Li, W.2    Srivatsa, M.3    Beyah, R.4
  • 16
    • 84921353541 scopus 로고    scopus 로고
    • Structure based data de-anonymization of social networks and mobility traces
    • Springer
    • JI, S., LI, W., SRIVATSA, M., HE, J. S., AND BEYAH, R. Structure based data de-anonymization of social networks and mobility traces. In Information Security. Springer, 2014, pp. 237-254.
    • (2014) Information Security , pp. 237-254
    • Ji, S.1    Li, W.2    Srivatsa, M.3    He, S.H.E.4    Beyah, R.5
  • 17
    • 84921415048 scopus 로고    scopus 로고
    • Collusion-tolerable privacy-preserving sum and product calculation without secure channel
    • JUNG, T., LI, X.-Y., AND WAN, M. Collusion-tolerable privacy-preserving sum and product calculation without secure channel. TDSC 12, 1 (2015), 45-57.
    • (2015) TDSC , vol.12 , Issue.1 , pp. 45-57
    • Jung, T.1    Li, X.-Y.2    Wan, M.3
  • 18
    • 84919829652 scopus 로고    scopus 로고
    • Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
    • JUNG, T., LI, X.-Y., WAN, Z., AND WAN, M. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. TIFS 10, 1 (2015), 190-199.
    • (2015) TIFS , vol.10 , Issue.1 , pp. 190-199
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3    Wan, M.4
  • 19
    • 84883089676 scopus 로고    scopus 로고
    • Privacy-preserving data aggregation without secure channel: Multi-variate polynomial evaluation
    • JUNG, T., MAO, X., LI, X.-Y., TANG, S.-J., GONG, W., AND ZHANG, L. Privacy-preserving data aggregation without secure channel: Multi-variate polynomial evaluation. In INFOCOM (2013), IEEE, pp. 2634-2642.
    • INFOCOM (2013), IEEE , pp. 2634-2642
    • Jung, T.1    Mao, X.2    Li, X.-Y.3    Tang, S.-J.4    Gong, W.5    Zhang, L.6
  • 24
    • 57149126815 scopus 로고    scopus 로고
    • Towards identity anonymization on graphs
    • LIU, K., AND TERZI, E. Towards identity anonymization on graphs. In SIGMOD (2008), ACM, pp. 93-106.
    • SIGMOD (2008), ACM , pp. 93-106
    • Liu, K.1    Terzi, E.2
  • 28
    • 70449632682 scopus 로고    scopus 로고
    • De-anonymizing social net-works
    • NARAYANAN, A., AND SHMATIKOV, V. De-anonymizing social net-works. In IEEE S&P (2009), pp. 173-187.
    • (2009) IEEE S&P , pp. 173-187
    • Narayanan, A.1    Shmatikov, V.2
  • 29
    • 84910630062 scopus 로고    scopus 로고
    • Community-enhanced de-anonymization of online social networks
    • NILIZADEH, S., KAPADIA, A., AND AHN, Y.-Y. Community-enhanced de-anonymization of online social networks. In ACM CCS (2014), pp. 537-548.
    • (2014) ACM CCS , pp. 537-548
    • Nilizadeh, S.1    Kapadia, A.2    Ahn, Y.-Y.3
  • 30
    • 84897734719 scopus 로고    scopus 로고
    • A Bayesian method for matching two similar graphs without seeds
    • PEDARSANI, P., FIGUEIREDO, D. R., AND GROSSGLAUSER, M. A bayesian method for matching two similar graphs without seeds. In Allerton (2013), pp. 1598-1607.
    • (2013) Allerton , pp. 1598-1607
    • Pedarsani, P.1    Figueiredo, D.R.2    Grossglauser, M.3
  • 31
    • 84892402373 scopus 로고    scopus 로고
    • A two-stage deanonymization attack against anonymized social networks
    • PENG, W., LI, F., ZOU, X., AND WU, J. A two-stage deanonymization attack against anonymized social networks. TC 63, 2 (2014), 290-303.
    • (2014) TC , vol.63 , Issue.2 , pp. 290-303
    • Peng, W.1    Li, F.2    Zou, X.3    Wu, J.4
  • 32
    • 84957061291 scopus 로고    scopus 로고
    • Linear time 1/2-approximation algorithm for maximum weighted matching in general graphs
    • Springer
    • PREIS, R. Linear time 1/2-approximation algorithm for maximum weighted matching in general graphs. In STACS (1999), Springer, pp. 259-269.
    • (1999) STACS , pp. 259-269
    • Preis, R.1
  • 35
    • 84964837698 scopus 로고    scopus 로고
    • A differentially private selective aggregation scheme for online user behavior analysis
    • QIAN, J., QIU, F., WU, F., RUAN, N., CHEN, G., AND TANG, S. A differentially private selective aggregation scheme for online user behavior analysis. In GLOBECOM (2015), IEEE.
    • GLOBECOM (2015), IEEE
    • Qian, J.1    Qiu, F.2    Wu, F.3    Ruan, N.4    Chen, G.5    Tang, S.6
  • 37
    • 84897829255 scopus 로고    scopus 로고
    • Collaborative information seeking: Guest editors' introduction
    • SHAH, C., CAPRA, R., AND HANSEN, P. Collaborative information seeking: Guest editors' introduction. IEEE TC 47, 3 (2014), 22-25.
    • (2014) IEEE TC , vol.47 , Issue.3 , pp. 22-25
    • Shah, C.1    Capra, R.2    Hansen, P.3
  • 38
    • 84869476246 scopus 로고    scopus 로고
    • Deanonymizing mobility traces: Using social network as a side-channel
    • SRIVATSA, M., AND HICKS, M. Deanonymizing mobility traces: Using social network as a side-channel. In ACM CCS (2012), pp. 628-637.
    • (2012) ACM CCS , pp. 628-637
    • Srivatsa, M.1    Hicks, M.2
  • 39
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • SWEENEY, L. k-anonymity: A model for protecting privacy. IJUFKS 10, 05 (2002), 557-570.
    • (2002) IJUFKS , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 40
    • 80052678555 scopus 로고    scopus 로고
    • Privacy-preserving social network publication against friendship attacks
    • ACM
    • TAI, C.-H., YU, P. S., YANG, D.-N., AND CHEN, M.-S. Privacy-preserving social network publication against friendship attacks. In SIGKDD (2011), ACM, pp. 1262-1270.
    • (2011) SIGKDD , pp. 1262-1270
    • Tai, C.-H.1    Yu, P.S.2    Yang, D.-N.3    Chen, M.-S.4
  • 41
    • 84880088538 scopus 로고    scopus 로고
    • Structural diversity for privacy in publishing social networks
    • SIAM
    • TAI, C.-H., YU, P. S., YANG, D.-N., AND CHEN, M.-S. Structural diversity for privacy in publishing social networks. In SDM (2011), SIAM, pp. 35-46.
    • (2011) SDM , pp. 35-46
    • Tai, C.-H.1    Yu, P.S.2    Yang, D.-N.3    Chen, M.-S.4
  • 42
    • 84883097279 scopus 로고    scopus 로고
    • Outsourcing privacy-preserving social networks to a cloud
    • WANG, G., LIU, Q., LI, F., YANG, S., AND WU, J. Outsourcing privacy-preserving social networks to a cloud. In IEEE INFOCOM (2013), pp. 2886-2894.
    • (2013) IEEE INFOCOM , pp. 2886-2894
    • Wang, G.1    Liu, Q.2    Li, F.3    Yang, S.4    Wu, J.5
  • 43
    • 84897859690 scopus 로고    scopus 로고
    • Identifying knowledge brokers and their role in enterprise research through social media
    • XU, Z., RAMANATHAN, J., AND RAMNATH, R. Identifying knowledge brokers and their role in enterprise research through social media. IEEE TC 47, 3 (2014), 26-31.
    • (2014) IEEE TC , vol.47 , Issue.3 , pp. 26-31
    • Xu, Z.1    Ramanathan, J.2    Ramnath, R.3
  • 44
    • 84887296627 scopus 로고    scopus 로고
    • On the performance of percolation graph matching
    • ACM
    • YARTSEVA, L., AND GROSSGLAUSER, M. On the performance of percolation graph matching. In COSN (2013), ACM, pp. 119-130.
    • (2013) COSN , pp. 119-130
    • Yartseva, L.1    Grossglauser, M.2
  • 45
    • 84904437773 scopus 로고    scopus 로고
    • Achieving differential privacy of data disclosure in the smart grid
    • IEEE
    • ZHAO, J., JUNG, T., WANG, Y., AND LI, X.-Y. Achieving differential privacy of data disclosure in the smart grid. In INFOCOM (2014), IEEE, pp. 504-512.
    • (2014) INFOCOM , pp. 504-512
    • Zhao, J.1    Jung, T.2    Wang, Y.3    Li, X.-Y.4
  • 46
    • 52649120205 scopus 로고    scopus 로고
    • Preserving privacy in social networks against neighborhood attacks
    • ZHOU, B., AND PEI, J. Preserving privacy in social networks against neighborhood attacks. In IEEE ICDE (2008), pp. 506-515.
    • (2008) IEEE ICDE , pp. 506-515
    • Zhou, B.1    Pei, J.2
  • 47
    • 84865065669 scopus 로고    scopus 로고
    • K-automorphism: A general framework for privacy preserving network publication
    • ZOU, L., CHEN, L., AND ÖZSU, M. T. K-automorphism: A general framework for privacy preserving network publication. PVLDB 2, 1 (2009), 946-957.
    • (2009) PVLDB , vol.2 , Issue.1 , pp. 946-957
    • Zou, L.1    Chen, L.2    Özsu, M.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.