Sciweavers

151 search results - page 3 / 31
» Edge Anonymity in Social Network Graphs
Sort
View
WWW
2007
ACM
14 years 9 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 6 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 3 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
SIROCCO
2008
13 years 10 months ago
On the Power of Local Orientations
We consider a network represented by a simple connected undirected graph with N anonymous nodes that have local orientations, i.e. incident edges of each vertex have locally-unique...
Monika Steinová
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 7 months ago
Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs
Sudipto Das, Ömer Egecioglu, Amr El Abbadi