نتایج جستجو برای: graph anonymization
تعداد نتایج: 199027 فیلتر نتایج به سال:
A popular means of social communication for online users has become a trend with rapid growth of social networks in the last few years. Facebook, Myspace, Twitter, LinkedIn, etc. have created huge amounts of data about interactions of social networks. Meanwhile, the trend is also true for offline scenarios with rapid growth of mobile devices such as smart phones, tablets, and laptops used for s...
The Degree Anonymity problem arises in the context ofcombinatorial graph anonymization. It asks, given a graph G and twointegers k and s, whether G can be made k-anonymous with at most smodifications. Here, a graph is k-anonymous if the graph contains for everyvertex at least k − 1 other vertices of the same degree. Complementingrecent investigations on its computational com...
Search log k-anonymization is based on the elimination of infrequent queries under exact (or nearly exact) matching conditions, which usually results in a big data loss and impaired utility. We present a more flexible, semantic approach to k-anonymity that consists of three steps: query concept mining, automatic query expansion, and affinity assessment of expanded queries. Based on the observat...
Given only a handful of local structural features about the nodes of an anonymized social graph, how can an adversary select an auxiliary (a.k.a. non-anonymized, known) graph to help him/her deanonymize (a.k.a. re-identify) the individuals in the graph? Examples of local structural features are node’s degree, node’s clustering coe cient, edge density of the node’s neighbors, etc. The objective ...
The anonymity of blockchain has accelerated the growth illegal activities and criminal behaviors on cryptocurrency platforms. Although decentralization is one typical characteristics blockchain, we urgently call for effective regulation to detect these ensure safety stability user transactions. Identity inference, which aims make a preliminary inference about account identity, plays significant...
RFID technology has been widely applied to various domains. However, the privacy concern embedded in RFID data becomes a major obstacle of its further application. In this paper, we report our recent achievement in developing a practical RFID data anonymization platform that supports both global and local suppressions to prevent RFID data from privacy linkage attacks without compromising the su...
This paper presents an attack that circumvents anonymization of IP addresses in IP network traffic data in O(n) time, or O(n) time under certain circumstances. The attack is based on packet injection, and circumvents all anonymization techniques that assign a static and unique pseudonym to an IP address. It turns out that the packet injection itself, as well as the extraction of the correspondi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید