Sciweavers

11 search results - page 1 / 3
» Taming the Devil: Techniques for Evaluating Anonymized Netwo...
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
NDSS
2007
IEEE
13 years 11 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
SENSYS
2003
ACM
13 years 10 months ago
Taming the underlying challenges of reliable multihop routing in sensor networks
The dynamic and lossy nature of wireless communication poses major challenges to reliable, self-organizing multihop networks. These non-ideal characteristics are more problematic ...
Alec Woo, Terence Tong, David E. Culler
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
14 years 4 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
13 years 11 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu