Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

Privacy preserving social network data publication

JH Abawajy, MIH Ninggal… - … communications surveys & …, 2016 - ieeexplore.ieee.org
The introduction of online social networks (OSN) has transformed the way people connect
and interact with each other as well as share information. OSN have led to a tremendous …

A survey on privacy in social media: Identification, mitigation, and applications

G Beigi, H Liu - ACM Transactions on Data Science, 2020 - dl.acm.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

A review of anonymization for healthcare data

IE Olatunji, J Rauch, M Katzensteiner, M Khosla - Big data, 2022 - liebertpub.com
Mining health data can lead to faster medical decisions, improvement in the quality of
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …

A privacy preservation model for facebook-style social network systems

PWL Fong, M Anwar, Z Zhao - … : 14th European Symposium on Research in …, 2009 - Springer
Recent years have seen unprecedented growth in the popularity of social network systems,
with Facebook being an archetypical example. The access control paradigm behind the …

Social network de-anonymization and privacy inference with knowledge graph model

J Qian, XY Li, C Zhang, L Chen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …

{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

S Ji, W Li, P Mittal, X Hu, R Beyah - 24th USENIX Security Symposium …, 2015 - usenix.org
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …

Injecting uncertainty in graphs for identity obfuscation

P Boldi, F Bonchi, A Gionis, T Tassa - arXiv preprint arXiv:1208.4145, 2012 - arxiv.org
Data collected nowadays by social-networking applications create fascinating opportunities
for building novel services, as well as expanding our understanding about social structures …

Fusing mobile, sensor, and social data to fully enable context-aware computing

A Beach, M Gartrell, X Xing, R Han, Q Lv… - Proceedings of the …, 2010 - dl.acm.org
In this paper, we identify mobile social networks as an important new direction of research in
mobile computing, and show how an expanded definition of mobile social networks that …

Identity obfuscation in graphs through the information theoretic lens

F Bonchi, A Gionis, T Tassa - Information Sciences, 2014 - Elsevier
Analyzing the structure of social networks is of interest in a wide range of disciplines.
Unfortunately, sharing social-network datasets is often restrained by privacy considerations …