Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

Synthetic data–anonymisation groundhog day

T Stadler, B Oprisanu, C Troncoso - 31st USENIX Security Symposium …, 2022 - usenix.org
Synthetic data has been advertised as a silver-bullet solution to privacy-preserving data
publishing that addresses the shortcomings of traditional anonymisation techniques. The …

Leakage in data mining: Formulation, detection, and avoidance

S Kaufman, S Rosset, C Perlich… - ACM Transactions on …, 2012 - dl.acm.org
Deemed “one of the top ten data mining mistakes”, leakage is the introduction of information
about the data mining target that should not be legitimately available to mine from. In …

How to work a crowd: Develo** crowd capital through crowdsourcing

J Prpić, PP Shukla, JH Kietzmann, IP McCarthy - Business Horizons, 2015 - Elsevier
Traditionally, the term 'crowd'was used almost exclusively in the context of people who self-
organized around a common purpose, emotion, or experience. Today, however, firms often …

Evaluating link prediction methods

Y Yang, RN Lichtenwalter, NV Chawla - Knowledge and Information …, 2015 - Springer
Link prediction is a popular research area with important applications in a variety of
disciplines, including biology, social science, security, and medicine. The fundamental …

A survey on privacy in social media: Identification, mitigation, and applications

G Beigi, H Liu - ACM Transactions on Data Science, 2020 - dl.acm.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

Blockchain is watching you: Profiling and deanonymizing ethereum users

F Béres, IA Seres, AA Benczúr… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Ethereum is the largest public blockchain by usage. It applies an account-based model,
which is inferior to Bitcoin's unspent transaction output model from a privacy perspective …

Characterizing entities in the bitcoin blockchain

M Jourdan, S Blandin, L Wynter… - … conference on data …, 2018 - ieeexplore.ieee.org
Bitcoin has created a new exchange paradigm within which financial transactions can be
trusted without an intermediary. This premise of a free decentralized transactional network …

MAGNA: maximizing accuracy in global network alignment

V Saraph, T Milenković - Bioinformatics, 2014 - academic.oup.com
Motivation: Biological network alignment aims to identify similar regions between networks
of different species. Existing methods compute node similarities to rapidly identify from …