Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Support vector machine learning for interdependent and structured output spaces
ICML '04 Proceedings of the twenty-first international conference on Machine learning
Toward Integrating Feature Selection Algorithms for Classification and Clustering
IEEE Transactions on Knowledge and Data Engineering
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Leveraging Relational Autocorrelation with Latent Group Models
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Proceedings of the 16th international conference on World Wide Web
Classification in Networked Data: A Toolkit and a Univariate Case Study
The Journal of Machine Learning Research
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Mixed Membership Stochastic Blockmodels
The Journal of Machine Learning Research
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Inferring private information using social network data
Proceedings of the 18th international conference on World wide web
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Inferring private information using social network data
Proceedings of the 18th international conference on World wide web
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
You are who you know: inferring user profiles in online social networks
Proceedings of the third ACM international conference on Web search and data mining
PriMa: an effective privacy protection mechanism for social networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Analysis of privacy in online social networks of runet
Proceedings of the 3rd international conference on Security of information and networks
unfriendly: multi-party privacy risks in social networks
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Identity in the Information Society
Exploiting statistical and relational information on the web and in social media
Proceedings of the fourth ACM international conference on Web search and data mining
Exploit of online social networks with community-based graph semi-supervised learning
ICONIP'10 Proceedings of the 17th international conference on Neural information processing: theory and algorithms - Volume Part I
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
Proceedings of the first ACM conference on Data and application security and privacy
Automatic sanitization of social network data to prevent inference attacks
Proceedings of the 20th international conference companion on World wide web
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
All liaisons are dangerous when all your friends are known to us
Proceedings of the 22nd ACM conference on Hypertext and hypermedia
What's in a name: a study of names, gender inference, and gender behavior in facebook
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications
Data leakage mitigation for discretionary access control in collaboration clouds
Proceedings of the 16th ACM symposium on Access control models and technologies
Social network extraction from texts: a thesis proposal
HLT-SS '11 Proceedings of the ACL 2011 Student Session
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Multiparty authorization framework for data sharing in online social networks
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Communications of the ACM
A comparative privacy analysis of geosocial networks
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
Proceedings of the 27th Annual Computer Security Applications Conference
Uniqueness and how it impacts privacy in health-related social science datasets
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Boundary regulation in social media
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Proceedings of the Fifth Workshop on Social Network Systems
Privacy attacks in social media using photo tagging networks: a case study with Facebook
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Limiting link disclosure in social network analysis through subgraph-wise perturbation
Proceedings of the 15th International Conference on Extending Database Technology
Self-disclosure decision making based on intimacy and privacy
Information Sciences: an International Journal
Advanced secure multimedia services for digital homes
Information Systems Frontiers
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Whom to ask?: jury selection for decision making tasks on micro-blog services
Proceedings of the VLDB Endowment
On the feasibility of user de-anonymization from shared mobile sensor data
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Theoretical Results on De-Anonymization via Linkage Attacks
Transactions on Data Privacy
Validation of network classifiers
SSPR'12/SPR'12 Proceedings of the 2012 Joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition
Do online social network friends still threaten my privacy?
Proceedings of the third ACM conference on Data and application security and privacy
Inferring User Interest Using Familiarity and Topic Similarity with Social Neighbors in Facebook
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
A search engine approach to estimating temporal changes in gender orientation of first names
Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries
Music similarity and retrieval
Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval
On the feasibility of inference attacks by third-party extensions to social network systems
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
curso: protect yourself from curse of attribute inference: a social network privacy-analyzer
Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
Inferring social roles and statuses in social networks
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
A tool for collecting provenance data in social media
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
@i seek 'fb.me': identifying users across multiple online social networks
Proceedings of the 22nd international conference on World Wide Web companion
Exploiting innocuous activity for correlating users across sites
Proceedings of the 22nd international conference on World Wide Web
Proceedings of the 22nd international conference on World Wide Web
Enriching in-person encounters through social media: A study on family connectedness for the elderly
International Journal of Human-Computer Studies
Proceedings of the 2013 conference on Internet measurement conference
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
A few good predictions: selective node labeling in a social network
Proceedings of the 7th ACM international conference on Web search and data mining
A defence scheme against Identity Theft Attack based on multiple social networks
Expert Systems with Applications: An International Journal
Antecipando possíveis implicações de privacidade na postagem de fotos no Facebook
Proceedings of the 12th Brazilian Symposium on Human Factors in Computing Systems
A time-evolution model for the privacy degree of information disseminated in online social networks
International Journal of Communication Networks and Distributed Systems
Data Mining and Knowledge Discovery
Using community structure to control information sharing in online social networks
Computer Communications
Journal of Information Science
Hi-index | 0.02 |
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. We show that on several well-known social media sites, we can easily and accurately recover the information of private-profile users. To the best of our knowledge, this is the first work that uses link-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles.