When people utilize social applications and services, their privacy suffers potential serious threats. In this work, we present a novel, robust, and effective de-anonymization attack to mobility trace data and social network data. First, we design a Unified Similarity (US) measurement which takes into account local and global structural characteristics of data, information obtained from auxiliary data, and knowledge inherited from on-going de-anonymization results. By analyzing the measurement on real datasets, we find that some datasets can potentially be de-anonymized accurately and the others can be de-anonymized in a coarse granularity. Utilizing this property, we present a US based De-Anonymization (DA) frame-work, which iteratively de...
Abstract — Recently, as more and more social network data has been published in one way or another, ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
With the advent of GPS-equipped devices, more and more geolocated datasets are being collected every...
Abstract. We present a novel de-anonymization attack on mobility trace data and social data. First, ...
International audienceReleasing connection data from social networking services can pose a significa...
Prix IEEE Best Student Paper AwardInternational audienceWith the advent of GPS-equipped devices, mor...
International audienceWith the advent of GPS-equipped devices, a massive amount of location data is ...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
In this paper, we study the quantification, practice, and implications of structural data (e.g., soc...
Mobile phone data are collected communication logs between human beings. There are two interesting a...
Abstract—In this paper, we conduct the first comprehensive quantification on the perfect de-anonymiz...
Abstract—With the popularity of cloud computing, many companies would outsource their social network...
The increasing demand for smart context-aware services and the widespread use of location-based serv...
Abstract—In this poster, we study optimization based structural data De-Anonymization (DA), includin...
Abstract — Recently, as more and more social network data has been published in one way or another, ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
With the advent of GPS-equipped devices, more and more geolocated datasets are being collected every...
Abstract. We present a novel de-anonymization attack on mobility trace data and social data. First, ...
International audienceReleasing connection data from social networking services can pose a significa...
Prix IEEE Best Student Paper AwardInternational audienceWith the advent of GPS-equipped devices, mor...
International audienceWith the advent of GPS-equipped devices, a massive amount of location data is ...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
In this paper, we study the quantification, practice, and implications of structural data (e.g., soc...
Mobile phone data are collected communication logs between human beings. There are two interesting a...
Abstract—In this paper, we conduct the first comprehensive quantification on the perfect de-anonymiz...
Abstract—With the popularity of cloud computing, many companies would outsource their social network...
The increasing demand for smart context-aware services and the widespread use of location-based serv...
Abstract—In this poster, we study optimization based structural data De-Anonymization (DA), includin...
Abstract — Recently, as more and more social network data has been published in one way or another, ...
We identify privacy risks associated with releasing network data sets and provide an algorithm that ...
With the advent of GPS-equipped devices, more and more geolocated datasets are being collected every...