The convergence of GIS and social media: challenges for GIScience

D Sui, M Goodchild - International journal of geographical …, 2011 - Taylor & Francis
It is hard to believe that 10 years have passed since we wrote our guest editorial for IJGIS
(Sui and Goodchild). Using the nascent evidence that emerged in the late 1990s, we …

Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

You are where you tweet: a content-based approach to geo-locating twitter users

Z Cheng, J Caverlee, K Lee - Proceedings of the 19th ACM international …, 2010 - dl.acm.org
We propose and evaluate a probabilistic framework for estimating a Twitter user's city-level
location based purely on the content of the user's tweets, even in the absence of any other …

Tweets from Justin Bieber's heart: the dynamics of the location field in user profiles

B Hecht, L Hong, B Suh, EH Chi - … of the SIGCHI conference on human …, 2011 - dl.acm.org
Little research exists on one of the most common, oldest, and most utilized forms of online
social geographic information: the'location'field found in most virtual community user …

Graph embedding for recommendation against attribute inference attacks

S Zhang, H Yin, T Chen, Z Huang, L Cui… - Proceedings of the Web …, 2021 - dl.acm.org
In recent years, recommender systems play a pivotal role in hel** users identify the most
suitable items that satisfy personal preferences. As user-item interactions can be naturally …

To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles

E Zheleva, L Getoor - Proceedings of the 18th international conference …, 2009 - dl.acm.org
In order to address privacy concerns, many social media websites allow users to hide their
personal profiles from the public. In this work, we show how an adversary can exploit an …

Comprehensive privacy analysis on federated recommender system against attribute inference attacks

S Zhang, W Yuan, H Yin - IEEE Transactions on Knowledge …, 2023 - ieeexplore.ieee.org
In recent years, recommender systems are crucially important for the delivery of
personalized services that satisfy users' preferences. With personalized recommendation …

Adversarial privacy-preserving graph embedding against inference attack

K Li, G Luo, Y Ye, W Li, S Ji… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Recently, the surge in popularity of the Internet of Things (IoT), mobile devices, social media,
etc., has opened up a large source for graph data. Graph embedding has been proved …

Attribute inference attacks in online social networks

NZ Gong, B Liu - ACM Transactions on Privacy and Security (TOPS), 2018 - dl.acm.org
We propose new privacy attacks to infer attributes (eg, locations, occupations, and interests)
of online social network users. Our attacks leverage seemingly innocent user information …