Privacy and security in online social networks: A survey
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …
professional lives of a huge segment of the population, with direct consequences to offline …
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …
span many different domains, ranging from online social network data from networks like …
Synthetic data–anonymisation groundhog day
Synthetic data has been advertised as a silver-bullet solution to privacy-preserving data
publishing that addresses the shortcomings of traditional anonymisation techniques. The …
publishing that addresses the shortcomings of traditional anonymisation techniques. The …
Leakage in data mining: Formulation, detection, and avoidance
Deemed “one of the top ten data mining mistakes”, leakage is the introduction of information
about the data mining target that should not be legitimately available to mine from. In …
about the data mining target that should not be legitimately available to mine from. In …
How to work a crowd: Develo** crowd capital through crowdsourcing
Traditionally, the term 'crowd'was used almost exclusively in the context of people who self-
organized around a common purpose, emotion, or experience. Today, however, firms often …
organized around a common purpose, emotion, or experience. Today, however, firms often …
Evaluating link prediction methods
Link prediction is a popular research area with important applications in a variety of
disciplines, including biology, social science, security, and medicine. The fundamental …
disciplines, including biology, social science, security, and medicine. The fundamental …
A survey on privacy in social media: Identification, mitigation, and applications
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …
participate in numerous activities on a daily basis. This results in tremendous amounts of …
Blockchain is watching you: Profiling and deanonymizing ethereum users
Ethereum is the largest public blockchain by usage. It applies an account-based model,
which is inferior to Bitcoin's unspent transaction output model from a privacy perspective …
which is inferior to Bitcoin's unspent transaction output model from a privacy perspective …
Characterizing entities in the bitcoin blockchain
Bitcoin has created a new exchange paradigm within which financial transactions can be
trusted without an intermediary. This premise of a free decentralized transactional network …
trusted without an intermediary. This premise of a free decentralized transactional network …
MAGNA: maximizing accuracy in global network alignment
Motivation: Biological network alignment aims to identify similar regions between networks
of different species. Existing methods compute node similarities to rapidly identify from …
of different species. Existing methods compute node similarities to rapidly identify from …