Differential privacy for deep and federated learning: A survey
Users' privacy is vulnerable at all stages of the deep learning process. Sensitive information
of users may be disclosed during data collection, during training, or even after releasing the …
of users may be disclosed during data collection, during training, or even after releasing the …
A brief survey on anonymization techniques for privacy preserving publishing of social network data
B Zhou, J Pei, WS Luk - ACM Sigkdd Explorations Newsletter, 2008 - dl.acm.org
Nowadays, partly driven by many Web 2.0 applications, more and more social network data
has been made publicly available and analyzed in one way or another. Privacy preserving …
has been made publicly available and analyzed in one way or another. Privacy preserving …
A framework for computing the privacy scores of users in online social networks
K Liu, E Terzi - ACM Transactions on Knowledge Discovery from Data …, 2010 - dl.acm.org
A large body of work has been devoted to address corporate-scale privacy concerns related
to social networks. Most of this work focuses on how to share social networks owned by …
to social networks. Most of this work focuses on how to share social networks owned by …
Towards identity anonymization on graphs
K Liu, E Terzi - Proceedings of the 2008 ACM SIGMOD international …, 2008 - dl.acm.org
The proliferation of network data in various application domains has raised privacy concerns
for the individuals involved. Recent studies show that simply removing the identities of the …
for the individuals involved. Recent studies show that simply removing the identities of the …
Social network analysis and mining for business applications
Social network analysis has gained significant attention in recent years, largely due to the
success of online social networking and media-sharing sites, and the consequent …
success of online social networking and media-sharing sites, and the consequent …
K-isomorphism: privacy preserving network publication against structural attacks
J Cheng, AW Fu, J Liu - Proceedings of the 2010 ACM SIGMOD …, 2010 - dl.acm.org
Serious concerns on privacy protection in social networks have been raised in recent years;
however, research in this area is still in its infancy. The problem is challenging due to the …
however, research in this area is still in its infancy. The problem is challenging due to the …
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an
algorithm that mitigates those risks. A network consists of entities connected by links …
algorithm that mitigates those risks. A network consists of entities connected by links …
K-automorphism: A general framework for privacy preserving network publication
The growing popularity of social networks has generated interesting data management and
data mining problems. An important concern in the release of these data for study is their …
data mining problems. An important concern in the release of these data for study is their …
Cross-platform identification of anonymous identical users in multiple social media networks
The last few years have witnessed the emergence and evolution of a vibrant research
stream on a large variety of online social media network (SMN) platforms. Recognizing …
stream on a large variety of online social media network (SMN) platforms. Recognizing …
The physics of communicability in complex networks
A fundamental problem in the study of complex networks is to provide quantitative measures
of correlation and information flow between different parts of a system. To this end, several …
of correlation and information flow between different parts of a system. To this end, several …