Re-identification attacks—A systematic literature review

J Henriksen-Bulmer, S Jeary - International Journal of Information …, 2016 - Elsevier
The publication of increasing amounts of anonymised open source data has resulted in a
worryingly rising number of successful re-identification attacks. This has a number of privacy …

SoK: Managing risks of linkage attacks on data privacy

J Powar, AR Beresford - Proceedings on Privacy Enhancing …, 2023 - petsymposium.org
Novel attacks on dataset privacy are usually met with the same range of responses: surprise
that a route to information gain exists from information previously thought to be safe; …

Sharing social networks using a novel differentially private graph model

T Gao, F Li - … 16th IEEE Annual Consumer Communications & …, 2019 - ieeexplore.ieee.org
Online social networks (OSNs) often contain sensitive information about individuals.
Therefore, anonymizing social network data before releasing it becomes an important issue …

Conditional adjacency anonymity in social graphs under active attacks

S Mauw, Y Ramírez-Cruz, R Trujillo-Rasua - Knowledge and Information …, 2019 - Springer
Social network data is typically made available in a graph format, where users and their
relations are represented by vertices and edges, respectively. In doing so, social graphs …

Robust active attacks on social graphs

S Mauw, Y Ramírez-Cruz, R Trujillo-Rasua - Data mining and knowledge …, 2019 - Springer
In order to prevent the disclosure of privacy-sensitive data, such as names and relations
between users, social network graphs have to be anonymised before publication. Naive …

Social network de-anonymization: More adversarial knowledge, more users re-identified?

J Qian, XY Li, T Jung, Y Fan, Y Wang… - ACM Transactions on …, 2019 - dl.acm.org
Previous works on social network de-anonymization focus on designing accurate and
efficient de-anonymization methods. We attempt to investigate the intrinsic relationship …

[HTML][HTML] Distance-based vertex identification in graphs: The outer multiset dimension

R Gil-Pons, Y Ramírez-Cruz, R Trujillo-Rasua… - Applied Mathematics …, 2019 - Elsevier
The characterisation of vertices in a network, in relation to other peers, has been used as a
primitive in many computational procedures, such as node localisation and (de-) …

Measuring importance of seeding for structural de-anonymization attacks in social networks

GG Gulyás, S Imre - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
Social networks allow their users to make their profiles and relationships private. However,
in recent years several powerful de-anonymization attacks have been proposed that are …

Analysis of grasshopper, a novel social network de-anonymization algorithm

B Simon, GG Gulyás, S Imre - Periodica Polytechnica Electrical …, 2014 - pp.bme.hu
Social networks have an important and possibly key role in our society today. In addition to
the benefits, serious privacy concerns also emerge: there are algorithms called de …

Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation

S Mauw, Y Ramírez-Cruz, R Trujillo-Rasua - Knowledge and Information …, 2022 - Springer
Active re-identification attacks constitute a serious threat to privacy-preserving social graph
publication, because of the ability of active adversaries to leverage fake accounts, aka sybil …