Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2011
DOI: 10.1145/2020408.2020596
|View full text |Cite
|
Sign up to set email alerts
|

On the privacy of anonymized networks

Abstract: The proliferation of online social networks, and the concomitant accumulation of user data, give rise to hotly debated issues of privacy, security, and control. One specific challenge is the sharing or public release of anonymized data without accidentally leaking personally identifiable information (PII). Unfortunately, it is often difficult to ascertain that sophisticated statistical techniques, potentially employing additional external data sources, are unable to break anonymity.In this paper, we consider a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

6
215
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 164 publications
(221 citation statements)
references
References 41 publications
6
215
0
Order By: Relevance
“…Lemma 14: [Difference of Binomials [18]] Let X 1 and X 2 be two binomial random variables with means λ 1 and λ 2 , where λ 2 > λ 1 . Then,…”
Section: A Concentration Lemmasmentioning
confidence: 99%
See 3 more Smart Citations
“…Lemma 14: [Difference of Binomials [18]] Let X 1 and X 2 be two binomial random variables with means λ 1 and λ 2 , where λ 2 > λ 1 . Then,…”
Section: A Concentration Lemmasmentioning
confidence: 99%
“…Graph Alignment [18], [13] We use the results related to the graph-alignment problem introduced in [18], [13]. The BiG(G(n, p); s) edge-sampling model from [18] generates two similar graphs G 1,2 from a common vertex set.…”
Section: A Concentration Lemmasmentioning
confidence: 99%
See 2 more Smart Citations
“…There are two major research directions on the privacy and security issues in OSNs: (1) to reveal the privacy threats in OSNs by conducting surveys [16,17] and proposing attack models [26], information inference algorithms [6,8,9,13,14,19,28], de-anonymization algorithms [4,21], and re-identification algorithms [27]; and (2) to reinforce users' privacy by redesigning the OSN system structure [5,10,20,23] and conducting anonymization [22,25]. This paper investigates the privacy setting breaches, which belongs to (1).…”
Section: Related Workmentioning
confidence: 99%