The convergence of GIS and social media: challenges for GIScience
D Sui, M Goodchild - International journal of geographical …, 2011 - Taylor & Francis
It is hard to believe that 10 years have passed since we wrote our guest editorial for IJGIS
(Sui and Goodchild). Using the nascent evidence that emerged in the late 1990s, we …
(Sui and Goodchild). Using the nascent evidence that emerged in the late 1990s, we …
Privacy and security in online social networks: A survey
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …
professional lives of a huge segment of the population, with direct consequences to offline …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user's city-level
location based purely on the content of the user's tweets, even in the absence of any other …
location based purely on the content of the user's tweets, even in the absence of any other …
Tweets from Justin Bieber's heart: the dynamics of the location field in user profiles
Little research exists on one of the most common, oldest, and most utilized forms of online
social geographic information: the'location'field found in most virtual community user …
social geographic information: the'location'field found in most virtual community user …
Graph embedding for recommendation against attribute inference attacks
In recent years, recommender systems play a pivotal role in hel** users identify the most
suitable items that satisfy personal preferences. As user-item interactions can be naturally …
suitable items that satisfy personal preferences. As user-item interactions can be naturally …
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their
personal profiles from the public. In this work, we show how an adversary can exploit an …
personal profiles from the public. In this work, we show how an adversary can exploit an …
Comprehensive privacy analysis on federated recommender system against attribute inference attacks
In recent years, recommender systems are crucially important for the delivery of
personalized services that satisfy users' preferences. With personalized recommendation …
personalized services that satisfy users' preferences. With personalized recommendation …
Adversarial privacy-preserving graph embedding against inference attack
Recently, the surge in popularity of the Internet of Things (IoT), mobile devices, social media,
etc., has opened up a large source for graph data. Graph embedding has been proved …
etc., has opened up a large source for graph data. Graph embedding has been proved …
Attribute inference attacks in online social networks
We propose new privacy attacks to infer attributes (eg, locations, occupations, and interests)
of online social network users. Our attacks leverage seemingly innocent user information …
of online social network users. Our attacks leverage seemingly innocent user information …