On-line social networks offer the opportunity to collect a huge amount of valuable information about billions of users. The analysis of this data by service providers and unintended third parties are posing serious treats to user privacy. In particular, recent work has shown that users participating in more than one on-line social network can be identified based only on the structure of their links to other users. An effective tool to de-anonymize social network users is represented by graph matching algorithms. Indeed, by exploiting a sufficiently large set of seed nodes, a percolation process can correctly match almost all nodes across the different social networks. In this paper, we show the crucial role of clustering, which is a relevan...
Graph matching algorithms rely on the availability of seed vertex pairs as side information to deano...
In approximate graph matching, the goal is to find the best correspondence between the labels of two...
We present a generic and automated approach to re-identifying nodes in anonymized social networks wh...
On-line social networks offer the opportunity to collect a huge amount of valuable information about...
Recently, graph matching algorithms have been successfully applied to the problem of network de-anon...
We address the problem of social network de-anonymization when relationships between people are desc...
We tackle the problem of user de-anonymization in social networks characterized by scale-free ...
Abstract-Digital traces left by users of online social networking services, even after anonymization...
In many graph–mining problems, two networks from differ-ent domains have to be matched. In the absen...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
The proliferation of online social networks, and the concomitant accumulation of user data, give ris...
The proliferation of social networks as a means of seamless communication between multiple parties a...
In order to protect privacy of social network participants, network graph data should be anonymised ...
Abstract — The privacy-preservation in social networks is major problem in now-a-days. In distribute...
Online social network providers have become treasure troves of in-formation for marketers and resear...
Graph matching algorithms rely on the availability of seed vertex pairs as side information to deano...
In approximate graph matching, the goal is to find the best correspondence between the labels of two...
We present a generic and automated approach to re-identifying nodes in anonymized social networks wh...
On-line social networks offer the opportunity to collect a huge amount of valuable information about...
Recently, graph matching algorithms have been successfully applied to the problem of network de-anon...
We address the problem of social network de-anonymization when relationships between people are desc...
We tackle the problem of user de-anonymization in social networks characterized by scale-free ...
Abstract-Digital traces left by users of online social networking services, even after anonymization...
In many graph–mining problems, two networks from differ-ent domains have to be matched. In the absen...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
The proliferation of online social networks, and the concomitant accumulation of user data, give ris...
The proliferation of social networks as a means of seamless communication between multiple parties a...
In order to protect privacy of social network participants, network graph data should be anonymised ...
Abstract — The privacy-preservation in social networks is major problem in now-a-days. In distribute...
Online social network providers have become treasure troves of in-formation for marketers and resear...
Graph matching algorithms rely on the availability of seed vertex pairs as side information to deano...
In approximate graph matching, the goal is to find the best correspondence between the labels of two...
We present a generic and automated approach to re-identifying nodes in anonymized social networks wh...