-
1
-
-
26944445962
-
-
Technical report, Stanford University
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. k-anonymity: Algorithms and hardness. Technical report, Stanford University, 2004.
-
(2004)
k-anonymity: Algorithms and hardness
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of ACM international conference on World Wide Web, pages 181-190, 2007.
-
(2007)
Proceedings of ACM international conference on World Wide Web
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
3
-
-
84879661174
-
Privacy is dead, and social media hold smoking gun
-
October
-
P. Cashmore. Privacy is dead, and social media hold smoking gun. CNN, October 2009.
-
(2009)
CNN
-
-
Cashmore, P.1
-
9
-
-
67649655480
-
Confessions of 'Facebook stalkers'
-
March
-
B. Dubow. Confessions of 'Facebook stalkers'. USA Today, March 2007.
-
(2007)
USA Today
-
-
Dubow, B.1
-
10
-
-
17644423946
-
Unsupervised named-entity extraction from the web: An experimental study
-
O. Etzioni, M. Cafarella, D. Downey, A.-M. Popescu, T. Shaked, S. Soderland, D. S. Weld, and A. Yates. Unsupervised named-entity extraction from the web: An experimental study. Artificial Intelligence, 165 (1): 91-134, 2005.
-
(2005)
Artificial Intelligence
, vol.165
, Issue.1
, pp. 91-134
-
-
Etzioni, O.1
Cafarella, M.2
Downey, D.3
Popescu, A.-M.4
Shaked, T.5
Soderland, S.6
Weld, D.S.7
Yates, A.8
-
11
-
-
0035841472
-
Ethical issues in qualitative research on internet communities
-
G. Eysenbach and J. E. Till. Ethical issues in qualitative research on internet communities. BMJ, 323: 1103-1105, 2001.
-
(2001)
BMJ
, vol.323
, pp. 1103-1105
-
-
Eysenbach, G.1
Till, J.E.2
-
15
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow., 1 (1): 102-114, 2008.
-
(2008)
Proc. VLDB Endow.
, vol.1
, Issue.1
, pp. 102-114
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
16
-
-
45949099898
-
Protecting private information in online social networks
-
J. He and W. W. Chu. Protecting private information in online social networks. In Intelligence and Security Informatics, pages 249-273, 2008.
-
(2008)
Intelligence and Security Informatics
, pp. 249-273
-
-
He, J.1
Chu, W.W.2
-
18
-
-
84863393378
-
Preserving privacy in social networks: A structure-aware approach
-
sept.
-
X. He, J. Vaidya, B. Shafiq, N. Adam, and V. Atluri. Preserving privacy in social networks: A structure-aware approach. In Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09. IEEE/WIC/ACM International Joint Conferences on, volume 1, pages 647-654, sept. 2009.
-
(2009)
Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09. IEEE/WIC/ACM International Joint Conferences on
, vol.1
, pp. 647-654
-
-
He, X.1
Vaidya, J.2
Shafiq, B.3
Adam, N.4
Atluri, V.5
-
19
-
-
27644505323
-
Valuating privacy
-
B. A. Huberman, E. Adar, and L. R. Fine. Valuating privacy. IEEE Security and Privacy, 3 (5): 22-25, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 22-25
-
-
Huberman, B.A.1
Adar, E.2
Fine, L.R.3
-
20
-
-
67649634939
-
Social network users overlook privacy pitfalls
-
April
-
M. Irvine. Social network users overlook privacy pitfalls. USA Today, April 2008.
-
(2008)
USA Today
-
-
Irvine, M.1
-
22
-
-
80054056884
-
Who's your best friend?: Targeted privacy attacks in location-sharing social networks
-
V. Kostakos, J. Venkatanathan, B. Reynolds, N. Sadeh, E. Toch, S. A. Shaikh, and S. Jones. Who's your best friend?: Targeted privacy attacks in location-sharing social networks. In Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11, pages 177-186, 2011.
-
(2011)
Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11
, pp. 177-186
-
-
Kostakos, V.1
Venkatanathan, J.2
Reynolds, B.3
Sadeh, N.4
Toch, E.5
Shaikh, S.A.6
Jones, S.7
-
23
-
-
84995488432
-
On the leakage of personally identifiable information via online social networks
-
New York, NY, USA. ACM
-
B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. In WOSN '09: Proceedings of the 2nd ACM workshop on Online social networks, pages 7-12, New York, NY, USA, 2009. ACM.
-
(2009)
WOSN '09: Proceedings of the 2nd ACM workshop on Online social networks
, pp. 7-12
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
27
-
-
57349153901
-
Facetnet: A framework for analyzing communities and their evolutions in dynamic networks
-
Y.-R. Lin, Y. Chi, S. Zhu, H. Sundaram, and B. L. Tseng. Facetnet: A framework for analyzing communities and their evolutions in dynamic networks. In WWW '08: Proceeding of the 17th international conference on World Wide Web, pages 685-694, 2008.
-
(2008)
WWW '08: Proceeding of the 17th international conference on World Wide Web
, pp. 685-694
-
-
Lin, Y.-R.1
Chi, Y.2
Zhu, S.3
Sundaram, H.4
Tseng, B.L.5
-
30
-
-
78650743404
-
A framework for computing the privacy scores of users in online social networks
-
December
-
K. Liu and E. Terzi. A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data, 5: 6: 1-6: 30, December 2010.
-
(2010)
ACM Trans. Knowl. Discov. Data
, vol.5
, pp. 61-630
-
-
Liu, K.1
Terzi, E.2
-
31
-
-
74049112106
-
-
Technical Report CMIDA-HiPSCCS 006-08, University of Kentucky
-
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preserving in social networks against sensitive edge disclosure. Technical Report CMIDA-HiPSCCS 006-08, University of Kentucky, 2008.
-
(2008)
Privacy preserving in social networks against sensitive edge disclosure
-
-
Liu, L.1
Wang, J.2
Liu, J.3
Zhang, J.4
-
33
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1 (1): 3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
35
-
-
46749097224
-
Measuring topological anonymity in social networks
-
Washington, DC, USA. IEEE Computer Society
-
L. Singh and J. Zhan. Measuring topological anonymity in social networks. In GRC '07: Proceedings of the 2007 IEEE International Conference on Granular Computing, page 770, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
GRC '07: Proceedings of the 2007 IEEE International Conference on Granular Computing
, pp. 770
-
-
Singh, L.1
Zhan, J.2
-
36
-
-
78650520974
-
Privacy policies for shared content in social network sites
-
December
-
A. C. Squicciarini, M. Shehab, and J. Wede. Privacy policies for shared content in social network sites. The VLDB Journal, 19: 777-796, December 2010.
-
(2010)
The VLDB Journal
, vol.19
, pp. 777-796
-
-
Squicciarini, A.C.1
Shehab, M.2
Wede, J.3
-
37
-
-
74049161141
-
Finding "hidden" connections on linkedin an argument for more pragmatic social network privacy
-
New York, NY, USA. ACM
-
J. Staddon. Finding "hidden" connections on linkedin an argument for more pragmatic social network privacy. In Proceedings of the 2nd ACM workshop on Security and artificial intelligence, AISec '09, pages 11-14, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2nd ACM workshop on Security and artificial intelligence, AISec '09
, pp. 11-14
-
-
Staddon, J.1
-
41
-
-
77954845334
-
Privacy and security for online social networks: challenges and opportunities
-
july-august
-
C. Zhang, J. Sun, X. Zhu, and Y. Fang. Privacy and security for online social networks: challenges and opportunities. Network, IEEE, 24 (4): 13-18, july-august 2010.
-
(2010)
Network, IEEE
, vol.24
, Issue.4
, pp. 13-18
-
-
Zhang, C.1
Sun, J.2
Zhu, X.3
Fang, Y.4
-
43
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
April. Earlier version appears as CS-TR-4926
-
E. Zheleva and L. Getoor. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In 18th International World Wide Web conference (WWW), April 2009. Earlier version appears as CS-TR-4926.
-
(2009)
18th International World Wide Web conference (WWW)
-
-
Zheleva, E.1
Getoor, L.2
-
45
-
-
70350632870
-
A brief survey on anonymization techniques for privacy preserving publishing of social network data
-
B. Zhou, J. Pei, and W. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl., 10 (2): 12-22, 2008.
-
(2008)
SIGKDD Explor. Newsl.
, vol.10
, Issue.2
, pp. 12-22
-
-
Zhou, B.1
Pei, J.2
Luk, W.3
-
46
-
-
84865065669
-
k-automorphism: A general framework for privacy preserving network publication
-
August
-
L. Zou, L. Chen, and M. T. özsu. k-automorphism: A general framework for privacy preserving network publication. Proc. VLDB Endow., 2: 946-957, August 2009.
-
(2009)
Proc. VLDB Endow.
, vol.2
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
|