Proceedings of the 18th international conference on World wide web
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Proceedings of the 18th international conference on World wide web
PriMa: an effective privacy protection mechanism for social networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
You are where you tweet: a content-based approach to geo-locating twitter users
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Automatic sanitization of social network data to prevent inference attacks
Proceedings of the 20th international conference companion on World wide web
Tweets from Justin Bieber's heart: the dynamics of the location field in user profiles
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
All liaisons are dangerous when all your friends are known to us
Proceedings of the 22nd ACM conference on Hypertext and hypermedia
A3P: adaptive policy prediction for shared images over popular content sharing sites
Proceedings of the 22nd ACM conference on Hypertext and hypermedia
Social network extraction from texts: a thesis proposal
HLT-SS '11 Proceedings of the ACL 2011 Student Session
Improving user interest inference from social neighbors
Proceedings of the 20th ACM international conference on Information and knowledge management
1st international workshop on user modeling from social media
Proceedings of the 2012 ACM international conference on Intelligent User Interfaces
C4PS: colors for privacy settings
Proceedings of the 21st international conference companion on World Wide Web
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A content-driven framework for geolocating microblog users
ACM Transactions on Intelligent Systems and Technology (TIST) - Special section on twitter and microblogging services, social recommender systems, and CAMRa2010: Movie recommendation in context
Do online social network friends still threaten my privacy?
Proceedings of the third ACM conference on Data and application security and privacy
C4PS - helping facebookers manage their privacy settings
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
A Probabilistic Inference Attack on Suppressed Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Music similarity and retrieval
Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval
curso: protect yourself from curse of attribute inference: a social network privacy-analyzer
Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
Know your personalization: learning topic level personalization in online services
Proceedings of the 22nd international conference on World Wide Web
Proceedings of the 22nd international conference on World Wide Web
Homing socialbots: intrusion on a specific organization's employee using Socialbots
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Generating supplemental content information using virtual profiles
Proceedings of the 7th ACM conference on Recommender systems
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
Hi-index | 0.00 |
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. Some of the information revealed inside these networks is private and it is possible that corporations could use learning algorithms on the released data to predict undisclosed private information. In this paper, we explore how to launch inference attacks using released social networking data to predict undisclosed private information about individuals. We then explore the effectiveness of possible sanitization techniques that can be used to combat such inference attacks under different scenarios.