Sciweavers

21 search results - page 3 / 5
» Privacy Preservation in Social Networks with Sensitive Edge ...
Sort
View
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
14 years 2 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
PVLDB
2010
121views more  PVLDB 2010»
13 years 3 months ago
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background...
Mingxuan Yuan, Lei Chen 0002, Philip S. Yu
SOCIALCOM
2010
13 years 2 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
CN
2011
129views more  CN 2011»
12 years 12 months ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 6 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi