Sciweavers

227 search results - page 3 / 46
» Data and Structural k-Anonymity in Social Networks
Sort
View
WWW
2007
ACM
14 years 5 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg
DEBU
2008
187views more  DEBU 2008»
13 years 4 months ago
Social SQL: Tools for Exploring Social Databases
Social media are constructed from the collective contributions of potentially millions of individuals and present an increasingly common and large scale form of database. As these...
Marc A. Smith, Vladimir Barash
ICDM
2007
IEEE
166views Data Mining» more  ICDM 2007»
13 years 11 months ago
A Divisive Hierarchical Structural Clustering Algorithm for Networks
Many systems in sciences, engineering and nature can be modeled as networks. Examples are internet, metabolic networks and social networks. Network clustering algorithms aimed to ...
Nurcan Yuruk, Mutlu Mete, Xiaowei Xu, Thomas A. J....
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 2 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
PVLDB
2008
146views more  PVLDB 2008»
13 years 4 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...