Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

Collective data-sanitization for preventing sensitive information inference attacks in social networks

Z Cai, Z He, X Guan, Y Li - IEEE Transactions on Dependable …, 2016 - ieeexplore.ieee.org
Releasing social network data could seriously breach user privacy. User profile and
friendship relations are inherently private. Unfortunately, sensitive information may be …

[PDF][PDF] Dependence makes you vulnberable: Differential privacy under dependent tuples.

C Liu, S Chakraborty, P Mittal - NDSS, 2016 - princeton.edu
Differential privacy (DP) is a widely accepted mathematical framework for protecting data
privacy. Simply stated, it guarantees that the distribution of query results changes only …

A survey on privacy in social media: Identification, mitigation, and applications

G Beigi, H Liu - ACM Transactions on Data Science, 2020 - dl.acm.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

Social network de-anonymization and privacy inference with knowledge graph model

J Qian, XY Li, C Zhang, L Chen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …

{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

S Ji, W Li, P Mittal, X Hu, R Beyah - 24th USENIX Security Symposium …, 2015 - usenix.org
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …

De-anonymizing social networks and inferring private attributes using knowledge graphs

J Qian, XY Li, C Zhang, L Chen - IEEE INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
Social network data is widely shared, transferred and published for research purposes and
business interests, but it has raised much concern on users' privacy. Even though users' …

Survey on improving data utility in differentially private sequential data publishing

X Yang, T Wang, X Ren, W Yu - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
The massive generation, extensive sharing, and deep exploitation of data in the big data era
have raised unprecedented privacy threats. To address privacy concerns, various privacy …