We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider a particular threat in which an attacker subverts user accounts to gain information about local neighborhoods in the network and pieces them together in order to build a global picture. We analyze, both experimentally and theoretically, the number of user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of the lookahead provided by ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Advances in technology have made it possible to collect data about individuals and the connections b...
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowl...
Abstract. Online social networks have become an important part of the online activities on the web a...
Abstract The explosion in the use of social networks has also created new kinds of security and priv...
Abstract. In this paper, we introduce a navigation privacy attack, where an external adversary attem...
These Social networks allow their members to connect by means of various web linkes in which the We...
Abstract—A growing body of research leverages social net-work based trust relationships to improve t...
In order to address privacy concerns, many social media websites allow users to hide their personal ...
Participation in social networks has surpassed all other online activities to be one of the top inte...
International audienceWhile online social networks have become an important channel for social inter...
Abstract—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponentia...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceThe rapid grow...
has increased the visibility of users profiles and interactions performed between users. In this pap...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Advances in technology have made it possible to collect data about individuals and the connections b...
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowl...
Abstract. Online social networks have become an important part of the online activities on the web a...
Abstract The explosion in the use of social networks has also created new kinds of security and priv...
Abstract. In this paper, we introduce a navigation privacy attack, where an external adversary attem...
These Social networks allow their members to connect by means of various web linkes in which the We...
Abstract—A growing body of research leverages social net-work based trust relationships to improve t...
In order to address privacy concerns, many social media websites allow users to hide their personal ...
Participation in social networks has surpassed all other online activities to be one of the top inte...
International audienceWhile online social networks have become an important channel for social inter...
Abstract—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponentia...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceThe rapid grow...
has increased the visibility of users profiles and interactions performed between users. In this pap...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
Advances in technology have made it possible to collect data about individuals and the connections b...