Social network data is typically made available in a graph format, where users and their relations are represented by vertices and edges, respectively. In doing so, social graphs need to be anonymised to resist various privacy attacks. Among these, the so-called active attacks, where an adversary has the ability to enrol sybil accounts in the social network, have proven difficult to counteract. In this article, we provide an anonymisation technique that successfully thwarts active attacks while causing low structural perturbation. We achieve this goal by introducing (k, Γ G,ℓ) -adjacency anonymity: a privacy property based on (k, ℓ) -anonymity that alleviates the computational burden suffered by anonymisation algorithms based on (k, ℓ...
Interpersonal organization information give significant data to organizations to better comprehend t...
Abstract-Privacy is one of the major concerns when publishing or sharing social network data for soc...
Active re-identification attacks pose a serious threat to privacy-preserving social graph publicatio...
peer reviewedPrivacy-preserving Publication of Dynamic Social Network Data in the Presence of Active...
AbstractActive re-identification attacks constitute a serious threat to privacy-preserving social gr...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing...
Graph anonymisation aims at reducing the ability of an attacker to identify the nodes of a graph by ...
We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymi...
Abstract- With the rapid growth of social networks, more researchers found that it is a great opport...
Social network providers anonymize graphs storing users' relationships to protect users from being r...
In order to protect privacy of social network participants, network graph data should be anonymised ...
Abstract—Privacy is one of the major concerns when publishing or sharing social network data for soc...
Interpersonal organization information give significant data to organizations to better comprehend t...
Abstract-Privacy is one of the major concerns when publishing or sharing social network data for soc...
Active re-identification attacks pose a serious threat to privacy-preserving social graph publicatio...
peer reviewedPrivacy-preserving Publication of Dynamic Social Network Data in the Presence of Active...
AbstractActive re-identification attacks constitute a serious threat to privacy-preserving social gr...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
The popularity of online social media platforms provides an unprecedented opportunity to study real-...
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing...
Graph anonymisation aims at reducing the ability of an attacker to identify the nodes of a graph by ...
We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymi...
Abstract- With the rapid growth of social networks, more researchers found that it is a great opport...
Social network providers anonymize graphs storing users' relationships to protect users from being r...
In order to protect privacy of social network participants, network graph data should be anonymised ...
Abstract—Privacy is one of the major concerns when publishing or sharing social network data for soc...
Interpersonal organization information give significant data to organizations to better comprehend t...
Abstract-Privacy is one of the major concerns when publishing or sharing social network data for soc...
Active re-identification attacks pose a serious threat to privacy-preserving social graph publicatio...