Knowledge graphs

A Hogan, E Blomqvist, M Cochez, C d'Amato… - ACM Computing …, 2021 - dl.acm.org
In this article, we provide a comprehensive introduction to knowledge graphs, which have
recently garnered significant attention from both industry and academia in scenarios that …

A brief survey on anonymization techniques for privacy preserving publishing of social network data

B Zhou, J Pei, WS Luk - ACM Sigkdd Explorations Newsletter, 2008 - dl.acm.org
Nowadays, partly driven by many Web 2.0 applications, more and more social network data
has been made publicly available and analyzed in one way or another. Privacy preserving …

Measuring large-scale social networks with high resolution

A Stopczynski, V Sekara, P Sapiezynski, A Cuttone… - PloS one, 2014 - journals.plos.org
This paper describes the deployment of a large-scale study designed to measure human
interactions across a variety of communication channels, with high temporal resolution and …

De-anonymizing social networks

A Narayanan, V Shmatikov - 2009 30th IEEE symposium on …, 2009 - ieeexplore.ieee.org
Operators of online social networks are increasingly sharing potentially sensitive information
about users and their relationships with advertisers, application developers, and data …

A framework for computing the privacy scores of users in online social networks

K Liu, E Terzi - ACM Transactions on Knowledge Discovery from Data …, 2010 - dl.acm.org
A large body of work has been devoted to address corporate-scale privacy concerns related
to social networks. Most of this work focuses on how to share social networks owned by …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

Towards identity anonymization on graphs

K Liu, E Terzi - Proceedings of the 2008 ACM SIGMOD international …, 2008 - dl.acm.org
The proliferation of network data in various application domains has raised privacy concerns
for the individuals involved. Recent studies show that simply removing the identities of the …

Boosting the accuracy of differentially-private histograms through consistency

M Hay, V Rastogi, G Miklau, D Suciu - arXiv preprint arXiv:0904.0942, 2009 - arxiv.org
We show that it is possible to significantly improve the accuracy of a general class of
histogram queries while satisfying differential privacy. Our approach carefully chooses a set …

Accurate estimation of the degree distribution of private networks

M Hay, C Li, G Miklau, D Jensen - 2009 Ninth IEEE …, 2009 - ieeexplore.ieee.org
We describe an efficient algorithm for releasing a provably private estimate of the degree
distribution of a network. The algorithm satisfies a rigorous property of differential privacy …

Social network analysis and mining for business applications

F Bonchi, C Castillo, A Gionis, A Jaimes - ACM Transactions on …, 2011 - dl.acm.org
Social network analysis has gained significant attention in recent years, largely due to the
success of online social networking and media-sharing sites, and the consequent …