A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

A survey on mobile social networks: Applications, platforms, system architectures, and future research directions

X Hu, THS Chu, VCM Leung, ECH Ngai… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Mobile social networks (MSNs) have become increasingly popular in supporting many novel
applications since emerging in the recent years. Their applications and services are of great …

Panda: Public auditing for shared data with efficient user revocation in the cloud

B Wang, B Li, H Li - IEEE Transactions on services computing, 2013 - ieeexplore.ieee.org
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …

An efficient privacy-preserving outsourced calculation toolkit with multiple keys

X Liu, RH Deng, KKR Choo… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation
under multiple encrypted keys (EPOM). Using EPOM, a large scale of users can securely …

Authorized private keyword search over encrypted data in cloud computing

M Li, S Yu, N Cao, W Lou - 2011 31st international conference …, 2011 - ieeexplore.ieee.org
In cloud computing, clients usually outsource their data to the cloud storage servers to
reduce the management costs. While those data may contain sensitive personal information …

Towards a visual privacy advisor: Understanding and predicting privacy risks in images

T Orekondy, B Schiele, M Fritz - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
With an increasing number of users sharing information online, privacy implications entailing
such actions are a major concern. For explicit content, such as user profile or GPS data …

SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency

R Lu, X Lin, X Shen - IEEE transactions on parallel and …, 2012 - ieeexplore.ieee.org
With the pervasiveness of smart phones and the advance of wireless body sensor networks
(BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare …

Exploiting social ties for cooperative D2D communications: A mobile social networking case

X Chen, B Proulx, X Gong… - IEEE/ACM Transactions on …, 2014 - ieeexplore.ieee.org
Thanks to the convergence of pervasive mobile communications and fast-growing online
social networking, mobile social networking is penetrating into our everyday life. Aiming to …

Fast and private computation of cardinality of set intersection and union

E De Cristofaro, P Gasti, G Tsudik - International Conference on …, 2012 - Springer
In many everyday scenarios, sensitive information must be shared between parties without
complete mutual trust. Private set operations are particularly useful to enable sharing …

A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse

S Zhang, Y Wang, E Luo, Q Liu, K Gu… - Journal of Systems …, 2023 - Elsevier
Intelligent identification of close friends is the mainstream approach to protect users' multi-
dimensional data in the social metaverse. It provides a fine-grained matching service for …