In the real world, graph structured data is ubiquitous. For example, social networks, communications networks, logistics networks, etc. can all be modeled as graphs. Many concepts and theories have been proposed to deepen the understanding of the graph data and be used to solve problems of practical interest represented by graphs. However, little of this work takes privacy concerns into account. The objective of this dissertation is to investigate the problem of preserving the privacy of graph structured data while enabling useful analysis. To this end, we have addressed the following research issues. First, we have investigated the Privacy Preserving Link Discovery problem. Link discovery is the process of identifying association(s) amo...
In graph machine learning, data collection, sharing, and analysis often involve multiple parties, ea...
In many prevalent application domains, such as business to business network, social networks, and se...
This dissertation addresses the challenge of enabling accurate analysis of network data while ensuri...
In the real world, many phenomena can be naturally modeled as a graph whose nodes represent entities...
In this paper we review the state of the art on graph privacy with special emphasis on applications ...
In this paper we review the state of the art on graph privacy with special emphasis on applications ...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
The problem of privacy-preserving data mining has attracted considerable attention in recent years b...
The maximum-flow problem arises in a wide variety of applications such as financial transactions and...
Recently, a huge amount of social networks have been made publicly available. In parallel, several d...
Graph theory is one of the truly interdisciplinary fields of research. Not only does the application...
Nowadays, more and more people join social networks, such as Facebook, Linkedin, and Livespace, to s...
Abstract—Privacy is one of the major concerns when publishing or sharing social network data for soc...
The proliferation of social networks as a means of seamless communication between multiple parties a...
Abstract—A growing body of research leverages social net-work based trust relationships to improve t...
In graph machine learning, data collection, sharing, and analysis often involve multiple parties, ea...
In many prevalent application domains, such as business to business network, social networks, and se...
This dissertation addresses the challenge of enabling accurate analysis of network data while ensuri...
In the real world, many phenomena can be naturally modeled as a graph whose nodes represent entities...
In this paper we review the state of the art on graph privacy with special emphasis on applications ...
In this paper we review the state of the art on graph privacy with special emphasis on applications ...
© 2019 Leyla RoohiThere are many examples of graph-structured data, like records of friendships in s...
The problem of privacy-preserving data mining has attracted considerable attention in recent years b...
The maximum-flow problem arises in a wide variety of applications such as financial transactions and...
Recently, a huge amount of social networks have been made publicly available. In parallel, several d...
Graph theory is one of the truly interdisciplinary fields of research. Not only does the application...
Nowadays, more and more people join social networks, such as Facebook, Linkedin, and Livespace, to s...
Abstract—Privacy is one of the major concerns when publishing or sharing social network data for soc...
The proliferation of social networks as a means of seamless communication between multiple parties a...
Abstract—A growing body of research leverages social net-work based trust relationships to improve t...
In graph machine learning, data collection, sharing, and analysis often involve multiple parties, ea...
In many prevalent application domains, such as business to business network, social networks, and se...
This dissertation addresses the challenge of enabling accurate analysis of network data while ensuri...