Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A high-level programming environment for packet trace anonymization and transformation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A formal analysis of information disclosure in data exchange
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
ACM SIGKDD Explorations Newsletter
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Proceedings of the 16th international conference on World Wide Web
Hiding the presence of individuals from shared databases
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Noisy-OR Component Analysis and its Application to Link Analysis
The Journal of Machine Learning Research
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
PinKDD'07: privacy, security, and trust in KDD post-workshop report
ACM SIGKDD Explorations Newsletter - Special issue on visual analytics
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Privacy-Aware Collaborative Access Control in Web-Based Social Networks
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Anonymizing bipartite graph data using safe groupings
Proceedings of the VLDB Endowment
Proceedings of the 18th international conference on World wide web
On Link Privacy in Randomizing Social Networks
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
Relationship privacy: output perturbation for queries with joins
Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Anonymized data: generation, models, usage
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
Preserving Privacy in Social Networks: A Structure-Aware Approach
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Privacy and anonymization for very large datasets
Proceedings of the 18th ACM conference on Information and knowledge management
Key allocation schemes for private social networks
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Class-based graph anonymization for social network data
Proceedings of the VLDB Endowment
Social network classification incorporating link typevalues
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Proceedings of the 3rd Workshop on Social Network Mining and Analysis
Anonymizing bipartite graph data using safe groupings
The VLDB Journal — The International Journal on Very Large Data Bases
How to authenticate graphs without leaking
Proceedings of the 13th International Conference on Extending Database Technology
K-isomorphism: privacy preserving network publication against structural attacks
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
Prediction promotes privacy in dynamic social networks
WOSN'10 Proceedings of the 3rd conference on Online social networks
A Socratic method for validation of measurement-based networking research
Computer Communications
Personalized privacy protection in social networks
Proceedings of the VLDB Endowment
Resisting structural re-identification in anonymized social networks
The VLDB Journal — The International Journal on Very Large Data Bases
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Node protection in weighted social networks
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Surrogate parenthood: protected and informative graphs
Proceedings of the VLDB Endowment
Privacy-preserving social network publication against friendship attacks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Online social honeynets: trapping web crawlers in OSN
MDAI'11 Proceedings of the 8th international conference on Modeling decisions for artificial intelligence
A generalization based approach for anonymizing weighted social network graphs
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Sharing graphs using differentially private graph models
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Anonymizing geo-social network datasets
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy threat analysis of social network data
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Revisiting link privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Decentralised privacy preservation in social networks
International Journal of Business Information Systems
Limiting link disclosure in social network analysis through subgraph-wise perturbation
Proceedings of the 15th International Conference on Extending Database Technology
Protecting sensitive relationships against inference attacks in social networks
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
Semi-Edge anonymity: graph publication when the protection algorithm is available
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
A differentially private estimator for the stochastic Kronecker graph model
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Towards identity disclosure control in private hypergraph publishing
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
EWNI: efficient anonymization of vulnerable individuals in social networks
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
Privacy preserving social network publication on bipartite graphs
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Injecting uncertainty in graphs for identity obfuscation
Proceedings of the VLDB Endowment
A clustering approach for structural k-anonymity in social networks using genetic algorithm
Proceedings of the CUBE International Information Technology Conference
Privacy protection in social networks using l-diversity
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
The Anonymous Subgraph Problem
Computers and Operations Research
Transforming graph data for statistical relational learning
Journal of Artificial Intelligence Research
Anonymizing Subsets of Social Networks with Degree Constrained Subgraphs
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
A taxonomy of privacy-preserving record linkage techniques
Information Systems
Classifying online social network users through the social graph
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
On the protection of social networks user's information
Knowledge-Based Systems
Sensitive edges protection in social networks
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Anonymizing social networks: A generalization approach
Computers and Electrical Engineering
Graph publication when the protection algorithm is available
Data & Knowledge Engineering
Structure-aware graph anonymization
Web Intelligence and Agent Systems
Hi-index | 0.00 |
In this paper, we focus on the problem of preserving the privacy of sensitive relationships in graph data. We refer to the problem of inferring sensitive relationships from anonymized graph data as link reidentification. We propose five different privacy preservation strategies, which vary in terms of the amount of data removed (and hence their utility) and the amount of privacy preserved. We assume the adversary has an accurate predictive model for links, and we show experimentally the success of different link re-identification strategies under varying structural characteristics of the data.