Security and Privacy in Social Networks 2012
DOI: 10.1007/978-1-4614-4139-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Links Reconstruction Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…To mitigate the vulnerability of network anonymization mechanisms, Zhang et al [28] developed an enhanced network anonymization method by generating fake edges as plausible as possible. Fire et al [29] presented a classifier based link reconstruction attack method to identify sensitive relationships. Wu et al [30] defined a low-rank approximation based de-anonymization algorithm to reconstruct a network from link randomized observation.…”
Section: B Network Data De-anonymizationmentioning
confidence: 99%
“…To mitigate the vulnerability of network anonymization mechanisms, Zhang et al [28] developed an enhanced network anonymization method by generating fake edges as plausible as possible. Fire et al [29] presented a classifier based link reconstruction attack method to identify sensitive relationships. Wu et al [30] defined a low-rank approximation based de-anonymization algorithm to reconstruct a network from link randomized observation.…”
Section: B Network Data De-anonymizationmentioning
confidence: 99%
“…Even if the data owner removes sensitive links from the published network dataset, it may still be disclosed by link prediction and consequently lead to privacy breach. Michael et al [26] presented a link reconstruction attack, which is a method that attacker can use link prediction to infer a user's connections to others with high accuracy, but they did not mention how to defend the so-called linkreconstruction attack. Naturally, one can consider finding a way to prevent the link-prediction attack.…”
Section: Introductionmentioning
confidence: 99%
“…If used with malicious intent, link prediction algorithms may constitute a serious threat to both the privacy and the security of the general public. In particular, inspired by the saying "tell me who your friends are and I'll tell you who are", a network analyser may use link-prediction algorithms to perform a link reconstruction attack [16], which not only reveals your undisclosed "friends", but may also enhance the severity of the more general attribute inference attack [27] whereby the goal is to infer various private information about "who you are" [47,35].…”
Section: Introductionmentioning
confidence: 99%