Huge amounts of data are generated and shared in social networks and other network topologies. This raises privacy concerns when such data is not protected from leaking sensitive or personal information. Network topologies are commonly modeled through static graphs. Nevertheless, dynamic graphs better capture the temporal evolution and properties of such networks. Several differentially private mechanisms have been proposed for static graph data mining, but at the moment there are no such algorithms for dynamic data protection and mining. So, we propose two locally ϵ-differentially private methods for dynamic graph protection based on edge addition and deletion through the application of the noise-graph mechanism. We apply these methods to ...
With the increasing popularity of online social networks, such as twitter and weibo, privacy preserv...
The massive reach of social networks (SNs) has hidden their potential concerns, primarily those rela...
The use of private data is pivotal for numerous services including location--based ones, collaborati...
Huge amounts of data are generated and shared in social networks and other network topologies. This ...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Graph analysts cannot directly obtain the global structure in decentralized social networks, and ana...
Discovering frequent graph patterns in a graph database offers valuable information in a variety of ...
Graph data are widely collected and exploited by organizations, providing convenient services from p...
Information networks, such as social media and email net-works, often contain sensitive information....
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...
Nowadays, more and more people join social networks, such as Facebook, Linkedin, and Livespace, to s...
Triangle count is a critical parameter in mining relationships among people in social networks. Howe...
We consider the problem of inferring the underlying graph topology from smooth graph signals in a no...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Graphs can be used as a model for online social networks. In this framework, vertices represent indi...
With the increasing popularity of online social networks, such as twitter and weibo, privacy preserv...
The massive reach of social networks (SNs) has hidden their potential concerns, primarily those rela...
The use of private data is pivotal for numerous services including location--based ones, collaborati...
Huge amounts of data are generated and shared in social networks and other network topologies. This ...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Graph analysts cannot directly obtain the global structure in decentralized social networks, and ana...
Discovering frequent graph patterns in a graph database offers valuable information in a variety of ...
Graph data are widely collected and exploited by organizations, providing convenient services from p...
Information networks, such as social media and email net-works, often contain sensitive information....
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...
Nowadays, more and more people join social networks, such as Facebook, Linkedin, and Livespace, to s...
Triangle count is a critical parameter in mining relationships among people in social networks. Howe...
We consider the problem of inferring the underlying graph topology from smooth graph signals in a no...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Graphs can be used as a model for online social networks. In this framework, vertices represent indi...
With the increasing popularity of online social networks, such as twitter and weibo, privacy preserv...
The massive reach of social networks (SNs) has hidden their potential concerns, primarily those rela...
The use of private data is pivotal for numerous services including location--based ones, collaborati...