Mauw, Sjouke ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Trujillo Rasua, Rolando ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Xuan, Bochuan
External co-authors :
yes
Language :
English
Title :
Counteracting active attacks in social network graphs
Publication date :
2016
Event name :
Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016)
Event place :
Trento, Italy
Event date :
July 18-20, 2016
Audience :
International
Main work title :
Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016)
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In: The 16th International Conference on World Wide Web, WWW 2007, pp. 181-190. ACM, New York (2007)
Harary, F., Melter, R.A.: On the metric dimension of a graph. Ars Combinatoria 2, 191-1995 (1976)
Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural reidentification in anonymized social networks. Proc. VLDB Endow. 1(1), 102-114 (2008)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: The 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, pp. 93-106. ACM, New York (2008)
Mcauley, J., Leskovec, J.: Discovering social circles in ego networks. ACM Trans. Knowl. Discov. Data 8(1), 4:1-4:28 (2014)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: The 30th IEEE Symposium on Security and Privacy, SP 2009,Washington, DC, USA, pp. 173-187. IEEE Computer Society (2009)
Panzarasa, P., Opsahl, T., Carley, K.M.: Patterns and dynamics of users’ behavior and interaction: Network analysis of an online community. J. Am. Soc. Inf. Sci. Technol. 60(5), 911-932 (2009)
Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557-570 (2002)
Sweeney, L.: Uniqueness of simple demographics in the U.S. population. Technical Report, Carnegie Mellon University, Data Privacy Laboratory (2002)
Rolando Trujillo-Rasua and Ismael González Yero: k-metric antidimension: A privacy measure for social graphs. Inf. Sci. 328, 403-417 (2016)
Trujillo-Rasua, R., Yero, I.G.: Characterizing 1-metric antidimensional trees and unicyclic graphs. Comput. J. (2016, in press). doi:10.1093/comjnl/bxw021
Varrette, S., Bouvry, P., Cartiaux, H., Georgatos, F.: Management of an academic HPC cluster: The UL experience. In: The International Conference on High Performance Computing & Simulation (HPCS 2014), Bologna, Italy, pp. 959-967. IEEE (2014)
Wei, P., Li, F., Zou, X., Jie, W.: A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63(2), 290-303 (2014)
Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: The IEEE 24th International Conference on Data Engineering, ICDE 2008, Washington, DC, USA, pp. 506-515. IEEE Computer Society (2008)
Zou, L., Lei Chen, M., Özsu, T.: K-automorphism: A general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946-957 (2009)