Smartwalk: Enhancing social network security via adaptive random walks

Y Liu, S Ji, P Mittal - Proceedings of the 2016 ACM SIGSAC Conference …, 2016 - dl.acm.org
Random walks form a critical foundation in many social network based security systems and
applications. Currently, the design of such social security mechanisms is limited to the …

Preserving link privacy in social network based systems

P Mittal, C Papamanthou, D Song - arXiv preprint arXiv:1208.6189, 2012 - arxiv.org
A growing body of research leverages social network based trust relationships to improve
the functionality of the system. However, these systems expose users' trust relationships …

Linkmirage: How to anonymize links in dynamic social systems

C Liu, P Mittal - arXiv preprint arXiv:1501.01361, 2015 - arxiv.org
Social network based trust relationships present a critical foundation for designing
trustworthy systems, such as Sybil defenses, secure routing, and anonymous …

A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks

K Dhondt, V Le Pochat, A Voulimeneas… - Proceedings of the …, 2022 - dl.acm.org
Fitness tracking social networks such as Strava allow users to record sports activities and
share them publicly. Sharing encourages peer interaction but also constitutes a risk …

Pisces: Anonymous communication using social networks

P Mittal, M Wright, N Borisov - arXiv preprint arXiv:1208.6326, 2012 - arxiv.org
The architectures of deployed anonymity systems such as Tor suffer from two key problems
that limit user's trust in these systems. First, paths for anonymous communication are built …

On the mixing time of directed social graphs and security implications

A Mohaisen, H Tran, N Hopper, Y Kim - … of the 7th ACM Symposium on …, 2012 - dl.acm.org
Many graphs in general, and social graphs in particular, are directed by nature. However,
applications built on top of social networks, including Sybil defenses, information routing and …

Social networks meet distributed systems: towards a robust sybil defense under churn

N Chiluka, N Andrade, J Pouwelse, H Sips - Proceedings of the 10th …, 2015 - dl.acm.org
This paper examines the impact of heavy churn on the robustness of decentralized social
network-based Sybil defense (SNSD) schemes. Our analysis reveals that (i) heavy churn …

Starclique: Guaranteeing user privacy in social networks against intersection attacks

KPN Puttaswamy, A Sala, BY Zhao - Proceedings of the 5th international …, 2009 - dl.acm.org
Building on the popularity of online social networks (OSNs) such as Facebook, social
content-sharing applications allow users to form communities around shared interests …

Target privacy preserving for social networks

Z Jiang, L Sun, SY Philip, H Li, J Ma… - 2020 IEEE 36th …, 2020 - ieeexplore.ieee.org
In this paper, we incorporate the realistic scenario of key protection into link privacy
preserving and propose the target-link privacy preserving (TPP) model: target links referred …

Inferring networks from random walk-based node similarities

J Hoskins, C Musco, C Musco… - Advances in Neural …, 2018 - proceedings.neurips.cc
Digital presence in the world of online social media entails significant privacy risks. In this
work we consider a privacy threat to a social network in which an attacker has access to a …