Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
SIGCPR '96 Proceedings of the 1996 ACM SIGCPR/SIGMIS conference on Computer personnel research
Generalizing data to provide anonymity when disclosing information (abstract)
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Graph theory and its applications
Graph theory and its applications
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
gSpan: Graph-Based Substructure Pattern Mining
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Private social network analysis: how to assemble pieces of a graph privately
Proceedings of the 5th ACM workshop on Privacy in electronic society
Proceedings of the 16th international conference on World Wide Web
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Scalable modeling of real graphs using Kronecker multiplication
Proceedings of the 24th international conference on Machine learning
Challenges in mining social network data: processes, privacy, and paradoxes
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Anonymizing bipartite graph data using safe groupings
Proceedings of the VLDB Endowment
On Anti-Corruption Privacy Preserving Publication
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Audience selection for on-line brand advertising: privacy-friendly social network targeting
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy challenges and solutions in the social web
Crossroads - The Social Web
Privacy protection in social media networks a dream that can come true?
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Proceedings of the 3rd Workshop on Social Network Mining and Analysis
Privacy in dynamic social networks
Proceedings of the 19th international conference on World wide web
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
Protecting user privacy with multi-field anonymisation of ip addresses
Proceedings of the 3rd international conference on Security of information and networks
Prediction promotes privacy in dynamic social networks
WOSN'10 Proceedings of the 3rd conference on Online social networks
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Personalized privacy protection in social networks
Proceedings of the VLDB Endowment
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Privacy-preserving social network publication against friendship attacks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-aware spam detection in social bookmarking systems
i-KNOW '11 Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
Mailbook: privacy-protecting social networking via email
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Privacy threat analysis of social network data
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
The case for an open science in technology enhanced learning
International Journal of Technology Enhanced Learning
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
Comparing random-based and k-anonymity-based algorithms for graph anonymization
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
International Journal of Agent Technologies and Systems
Transforming graph data for statistical relational learning
Journal of Artificial Intelligence Research
Privacy preserving release of blogosphere data in the presence of search engines
Information Processing and Management: an International Journal
Hi-index | 0.00 |
Nowadays, partly driven by many Web 2.0 applications, more and more social network data has been made publicly available and analyzed in one way or another. Privacy preserving publishing of social network data becomes a more and more important concern. In this paper, we present a brief yet systematic review of the existing anonymization techniques for privacy preserving publishing of social network data. We identify the new challenges in privacy preserving publishing of social network data comparing to the extensively studied relational case, and examine the possible problem formulation in three important dimensions: privacy, background knowledge, and data utility. We survey the existing anonymization methods for privacy preservation in two categories: clustering-based approaches and graph modification approaches.