Sciweavers

170 search results - page 8 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
DASFAA
2010
IEEE
168views Database» more  DASFAA 2010»
14 years 28 days ago
Temporal Top-k Search in Social Tagging Sites Using Multiple Social Networks
In social tagging sites, users are provided easy ways to create social networks, to post and share items like bookmarks, videos, photos and articles, along with comments and tags. ...
Wenyu Huo, Vassilis J. Tsotras
WWW
2009
ACM
14 years 8 months ago
Inferring private information using social network data
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. S...
Jack Lindamood, Raymond Heatherly, Murat Kantarcio...
ESWS
2010
Springer
14 years 12 days ago
Semantics, Sensors, and the Social Web: The Live Social Semantics Experiments
Abstract. The Live Social Semantics is an innovative application that encourages and guides social networking between researchers at conferences and similar events. The application...
Martin Szomszor, Ciro Cattuto, Wouter Van den Broe...
PERCOM
2010
ACM
13 years 6 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
ICCSA
2007
Springer
14 years 1 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...