Privacy preserving social network data publication

JH Abawajy, MIH Ninggal… - … communications surveys & …, 2016 - ieeexplore.ieee.org
The introduction of online social networks (OSN) has transformed the way people connect
and interact with each other as well as share information. OSN have led to a tremendous …

Information security in big data: privacy and data mining

L Xu, C Jiang, J Wang, J Yuan, Y Ren - Ieee Access, 2014 - ieeexplore.ieee.org
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …

Re-identification attacks—A systematic literature review

J Henriksen-Bulmer, S Jeary - International Journal of Information …, 2016 - Elsevier
The publication of increasing amounts of anonymised open source data has resulted in a
worryingly rising number of successful re-identification attacks. This has a number of privacy …

A survey on privacy in social media: Identification, mitigation, and applications

G Beigi, H Liu - ACM Transactions on Data Science, 2020 - dl.acm.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

Social network de-anonymization and privacy inference with knowledge graph model

J Qian, XY Li, C Zhang, L Chen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …

De-anonymizing social networks and inferring private attributes using knowledge graphs

J Qian, XY Li, C Zhang, L Chen - IEEE INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …

An intelligent privacy preservation scheme for ev charging infrastructure

S Islam, S Badsha, S Sengupta, I Khalil… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The electric vehicle (EV) charging ecosystem, being a distinguishable paradigm of IIoT
infrastructure, consists of distributed and complex hybrid systems that demand adaptive data …

A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022 - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …

Privacy in social media: Identification, mitigation and applications

G Beigi, H Liu - arXiv preprint arXiv:1808.02191, 2018 - arxiv.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

Privacy-preserving collaborative intrusion detection in edge of internet of things: A robust and efficient deep generative learning approach

W Yao, H Zhao, H Shi - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The swift expansion of the Internet of Things (IoT) has brought about convenient services,
but it has also increased cyber threats. An intrusion detection system (IDS) is an effective …