International audienceIn the last decade we have witnessed a more than prolific growth of online social media content in sites designed for online social interactions. These systems have been traditionally designed as centralized silos, which unfortunately suffer from abusive behavior ranging from spam, cyberbullying to even censorship. This paper investigates the utility of supervised learning techniques for abuse detection in future decentralized settings, where less metadata remains available for use in learning algorithms. We present a method that uses a privacy-preserving protocol to exchange a fingerprint of the neighborhood of a pair of nodes, namely sender and receiver. Our method extracts social graph metadata to form a subset of k...
A malicious data miner can infer users’ private information in online social networks (OSNs) by data...
Online social networks, such as Face book, are increasingly utilized by many people. These networks ...
With the rapid growth of Internet technologies, cloud computing and social networks have become ubiq...
International audienceIn the last decade we have witnessed a more than prolific growth of online soc...
International audienceFuture online social networks need to not only protect sensitive data of their...
As an increasing amount of our lives is spent interacting online through social media platforms, mor...
Users are exposed to a large volume of harmful content that appears daily on various social network ...
The main goal of this thesis is to evaluate privacy-preserving protocols to detect abuse in future d...
International audienceIn this position paper we present the challenge of detecting abuse in a modern...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
With the rapid growth of the Internet, more and more people interact with their friends in online so...
Decentralized Online Social Networks (DOSNs) have been introduced as a privacy preserving alternativ...
We present a generic and automated approach to re-identifying nodes in anonymized social networks wh...
A malicious data miner can infer users’ private information in online social networks (OSNs) by data...
Online social networks, such as Face book, are increasingly utilized by many people. These networks ...
With the rapid growth of Internet technologies, cloud computing and social networks have become ubiq...
International audienceIn the last decade we have witnessed a more than prolific growth of online soc...
International audienceFuture online social networks need to not only protect sensitive data of their...
As an increasing amount of our lives is spent interacting online through social media platforms, mor...
Users are exposed to a large volume of harmful content that appears daily on various social network ...
The main goal of this thesis is to evaluate privacy-preserving protocols to detect abuse in future d...
International audienceIn this position paper we present the challenge of detecting abuse in a modern...
Releasing anonymized social network data for analysis has been a popular idea among data providers. ...
With the rapid growth of the Internet, more and more people interact with their friends in online so...
Decentralized Online Social Networks (DOSNs) have been introduced as a privacy preserving alternativ...
We present a generic and automated approach to re-identifying nodes in anonymized social networks wh...
A malicious data miner can infer users’ private information in online social networks (OSNs) by data...
Online social networks, such as Face book, are increasingly utilized by many people. These networks ...
With the rapid growth of Internet technologies, cloud computing and social networks have become ubiq...