نتایج جستجو برای: graph anonymization

تعداد نتایج: 199027  

Journal: :EURASIP J. Wireless Comm. and Networking 2016
Zhi-Guo Chen Ho-Seok Kang Shang-nan Yin Sung-Ryul Kim

A popular means of social communication for online users has become a trend with rapid growth of social networks in the last few years. Facebook, Myspace, Twitter, LinkedIn, etc. have created huge amounts of data about interactions of social networks. Meanwhile, the trend is also true for offline scenarios with rapid growth of mobile devices such as smart phones, tablets, and laptops used for s...

2014
Cristina Bazgan André Nichterlein

The Degree Anonymity problem arises in the context ofcombinatorial graph anonymization. It asks, given a graph G and twointegers k and s, whether G can be made k-anonymous with at most smodifications. Here, a graph is k-anonymous if the graph contains for everyvertex at least k − 1 other vertices of the same degree. Complementingrecent investigations on its computational com...

2013
Claudio Carpineto Giovanni Romano

Search log k-anonymization is based on the elimination of infrequent queries under exact (or nearly exact) matching conditions, which usually results in a big data loss and impaired utility. We present a more flexible, semantic approach to k-anonymity that consists of three steps: query concept mining, automatic query expansion, and affinity assessment of expanded queries. Based on the observat...

2014
Priya Govindan Sucheta Soundarajan Tina Eliassi-Rad

Given only a handful of local structural features about the nodes of an anonymized social graph, how can an adversary select an auxiliary (a.k.a. non-anonymized, known) graph to help him/her deanonymize (a.k.a. re-identify) the individuals in the graph? Examples of local structural features are node’s degree, node’s clustering coe cient, edge density of the node’s neighbors, etc. The objective ...

Journal: :Communications in computer and information science 2021

The anonymity of blockchain has accelerated the growth illegal activities and criminal behaviors on cryptocurrency platforms. Although decentralization is one typical characteristics blockchain, we urgently call for effective regulation to detect these ensure safety stability user transactions. Identity inference, which aims make a preliminary inference about account identity, plays significant...

2011
Rui Chen Benjamin C. M. Fung

RFID technology has been widely applied to various domains. However, the privacy concern embedded in RFID data becomes a major obstacle of its further application. In this paper, we report our recent achievement in developing a practical RFID data anonymization platform that supports both global and local suppressions to prevent RFID data from privacy linkage attacks without compromising the su...

2005
Tønnes Brekne André Årnes

This paper presents an attack that circumvents anonymization of IP addresses in IP network traffic data in O(n) time, or O(n) time under certain circumstances. The attack is based on packet injection, and circumvents all anonymization techniques that assign a static and unique pseudonym to an IP address. It turns out that the packet injection itself, as well as the extraction of the correspondi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید