Audience selection for on-line brand advertising: privacy-friendly social network targeting
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Security challenges for reputation mechanisms using online social networks
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
A verifiable, centralized, coercion-free reputation system
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Privacy-Preserving Relationship Path Discovery in Social Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Measurement-calibrated graph models for social network experiments
Proceedings of the 19th international conference on World wide web
Privacy in dynamic social networks
Proceedings of the 19th international conference on World wide web
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
Prediction promotes privacy in dynamic social networks
WOSN'10 Proceedings of the 3rd conference on Online social networks
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
unfriendly: multi-party privacy risks in social networks
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
"But the data is already public": on the ethics of research in Facebook
Ethics and Information Technology
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Resisting structural re-identification in anonymized social networks
The VLDB Journal — The International Journal on Very Large Data Bases
Rational privacy disclosure in social networks
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
SocialSearch: enhancing entity search with social network matching
Proceedings of the 14th International Conference on Extending Database Technology
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
On the privacy of anonymized networks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
How unique and traceable are usernames?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Online social honeynets: trapping web crawlers in OSN
MDAI'11 Proceedings of the 8th international conference on Modeling decisions for artificial intelligence
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Communications of the ACM
Mailbook: privacy-protecting social networking via email
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Sharing graphs using differentially private graph models
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Privacy-enhanced social-network routing
Computer Communications
Anonymizing geo-social network datasets
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Privacy threat analysis of social network data
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
A three dimensional sender anonymity metric
International Journal of Security and Networks
On the privacy and utility of anonymized social networks
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Privacy streamliner: a two-stage approach to improving algorithm efficiency
Proceedings of the second ACM conference on Data and Application Security and Privacy
Anonymity and roles associated with aggressive posts in an online forum
Computers in Human Behavior
Private similarity computation in distributed systems: from cryptography to differential privacy
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
A trust-based noise injection strategy for privacy protection in cloud
Software—Practice & Experience
Fine-grained access control of personal data
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
A vulnerability evaluation framework for online social network profiles: axioms and propositions
International Journal of Internet Technology and Secured Transactions
EWNI: efficient anonymization of vulnerable individuals in social networks
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
Injecting uncertainty in graphs for identity obfuscation
Proceedings of the VLDB Endowment
k-indistinguishable traffic padding in web applications
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Integrating multi-source user data to enhance privacy in social interaction
Proceedings of the 13th International Conference on Interacción Persona-Ordenador
Deanonymizing mobility traces: using social network as a side-channel
Proceedings of the 2012 ACM conference on Computer and communications security
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Theoretical Results on De-Anonymization via Linkage Attacks
Transactions on Data Privacy
Non-static nature of patient consent: shifting privacy perspectives in health information sharing
Proceedings of the 2013 conference on Computer supported cooperative work
Transforming graph data for statistical relational learning
Journal of Artificial Intelligence Research
A Guide to Differential Privacy Theory in Social Network Analysis
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
"Un-googling" publications: the ethics and problems of anonymization
CHI '13 Extended Abstracts on Human Factors in Computing Systems
An architecture for ethical and privacy-sensitive social network experiments
ACM SIGMETRICS Performance Evaluation Review
STK-anonymity: k-anonymity of social networks containing both structural and textual information
Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
Mosaic: quantifying privacy leakage in mobile networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Proceedings of the 22nd international conference on World Wide Web companion
@i seek 'fb.me': identifying users across multiple online social networks
Proceedings of the 22nd international conference on World Wide Web companion
Exploiting innocuous activity for correlating users across sites
Proceedings of the 22nd international conference on World Wide Web
Proceedings of the 22nd international conference on World Wide Web
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games
Information diffusion in online social networks: a survey
ACM SIGMOD Record
We know how you live: exploring the spectrum of urban lifestyles
Proceedings of the first ACM conference on Online social networks
On the performance of percolation graph matching
Proceedings of the first ACM conference on Online social networks
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Honeywords: making password-cracking detectable
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
You cannot hide for long: de-anonymization of real-world dynamic behaviour
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy awareness about information leakage: who knows what about me?
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Inferring trip destinations from driving habits data
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
A refined complexity analysis of degree anonymization in graphs
ICALP'13 Proceedings of the 40th international conference on Automata, Languages, and Programming - Volume Part II
Account Reachability: A Measure of Privacy Risk for Exposure of a User's Multiple SNS Accounts
Proceedings of International Conference on Information Integration and Web-based Applications & Services
SocialSearch+: enriching social network with web evidences
World Wide Web
Structure-aware graph anonymization
Web Intelligence and Agent Systems
Journal of Information Science
Hi-index | 0.03 |
_cf_loadingtexthtml="";_cf_contextpath="";_cf_ajaxscriptsrc="/CFIDE/scripts/ajax";_cf_jsonprefix='//';_cf_clientid='61A39AA84E82BC5982B4DB63A00E27F4';De-anonymizing Social Networks function settab() { var mytabs = ColdFusion.Layout.getTabLayout('citationdetails'); mytabs.on('tabchange', function(tabpanel,activetab) { document.cookie = 'picked=' + '1608132' + ',' + activetab.id; }) }function letemknow(){ ColdFusion.Window.show('letemknow');}function testthis(){alert('test');}function loadalert(){ alert("I am in the load alert"); }function loadalert2(){ alert("I am in the load alert2"); } google.load('visualization', '1', {packages:['orgchart']}); google.setOnLoadCallback(drawChart); function drawChart() { var data = new google.visualization.DataTable(); data.addColumn('string', 'Name'); data.addColumn('string', 'Manager'); data.addColumn('string', 'ToolTip'); data.addRows([ [{v:'0', f:'CCS for this Article