Network structure inference, a survey: Motivations, methods, and applications

I Brugere, B Gallagher, TY Berger-Wolf - ACM Computing Surveys …, 2018 - dl.acm.org
Networks represent relationships between entities in many complex systems, spanning from
online social interactions to biological cell development and brain connectivity. In many …

A survey on interdependent privacy

M Humbert, B Trubert, K Huguenin - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The privacy of individuals does not only depend on their own actions and data but may also
be affected by the privacy decisions and by the data shared by other individuals. This …

Poisoning attacks to graph-based recommender systems

M Fang, G Yang, NZ Gong, J Liu - … of the 34th annual computer security …, 2018 - dl.acm.org
Recommender system is an important component of many web services to help users locate
items that match their interests. Several studies showed that recommender systems are …

Stealing links from graph neural networks

X He, J Jia, M Backes, NZ Gong, Y Zhang - 30th USENIX security …, 2021 - usenix.org
Graph data, such as chemical networks and social networks, may be deemed
confidential/private because the data owner often spends lots of resources collecting the …

Missing link prediction using common neighbor and centrality based parameterized algorithm

I Ahmad, MU Akhtar, S Noor, A Shahnaz - Scientific reports, 2020 - nature.com
Real world complex networks are indirect representation of complex systems. They grow
over time. These networks are fragmented and raucous in practice. An important concern …

Co-embedding attributed networks

Z Meng, S Liang, H Bao, X Zhang - … conference on web search and data …, 2019 - dl.acm.org
Existing embedding methods for attributed networks aim at learning low-dimensional vector
representations for nodes only but not for both nodes and attributes, resulting in the fact that …

Graph embedding for recommendation against attribute inference attacks

S Zhang, H Yin, T Chen, Z Huang, L Cui… - Proceedings of the Web …, 2021 - dl.acm.org
In recent years, recommender systems play a pivotal role in helping users identify the most
suitable items that satisfy personal preferences. As user-item interactions can be naturally …

{AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning

J Jia, NZ Gong - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Users in various web and mobile applications are vulnerable to attribute inference attacks, in
which an attacker leverages a machine learning classifier to infer a target user's private …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

Attacking graph-based classification via manipulating the graph structure

B Wang, NZ Gong - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Graph-based classification methods are widely used for security analytics. Roughly
speaking, graph-based classification methods include collective classification and graph …