Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,083 Hits in 8.1 sec

Privacy and Utility of Inference Control Mechanisms for Social Computing Applications

Seyed Hossein Ahmadinejad, Philip W.L. Fong, Reihaneh Safavi-Naini
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
on selected components of the user profile.  ...  To the best of our knowledge, ours is the first work to articulate precise privacy and utility goals of inference control mechanisms for third-party applications in social computing platforms.  ...  Acknowledgments This work is supported in part by an NSERC Discovery Grant (RGPIN-2014-06611) and a Canada Research Chair (950-229712).  ... 
doi:10.1145/2897845.2897878 dblp:conf/ccs/AhmadinejadFS16 fatcat:kux6h5qskvc7jegwgz33znzibi

Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis [article]

Glynn Rogers, Malcolm Crompton, Gaurav Sapre, Jonathan Chan
2023 arXiv   pre-print
In a dialog based attack, by having enough of a potential victim's personal data to be convincing, a social engineer impersonates the victim in order to manipulate the attack's target into revealing sufficient  ...  We use an orthogonalised log linear analysis of data in the form of a contingence table to develop a measure of how susceptible particular subtables are to probabilistic inference as the basis for our  ...  and detecting network based attacks.  ... 
arXiv:2302.13532v1 fatcat:seotrckjwzcuxm72m2qnty4eai

Privacy in Social Media: Identification, Mitigation and Applications [article]

Ghazaleh Beigi, Huan Liu
2018 arXiv   pre-print
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data.  ...  Consequently, various protection techniques have been proposed to anonymize user-generated social media data. There is a vast literature on privacy of users in social media from many perspectives.  ...  A user's ego network is a subset of the original social network based on the user's friends and the social relations among them.  ... 
arXiv:1808.02191v1 fatcat:grcar6kx7nbqlf7o3ygrn4te44

Ontology-based Attack Graph Enrichment [article]

Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia-Alfaro
2022 arXiv   pre-print
As a result, predicates get periodically updated, based on attack evidences and ontology enrichment.  ...  Attack graphs provide a representation of possible actions that adversaries can perpetrate to attack a system.  ...  Images and videos of altercations, evacuation, and car fires are posted on social media. At the same time, a denial-of-service cyber-attack against the municipality network is perpetrated.  ... 
arXiv:2202.04016v1 fatcat:f2u4frckqvgjhesbxqm3vyghe4

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model

Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han
2017 IEEE Transactions on Dependable and Secure Computing  
Our experiment on data of real social networks shows that knowledge graphs can power de-anonymization and inference attacks, and thus increase the risk of privacy disclosure.  ...  This suggests the validity of knowledge graphs as a general effective model of attackers' background knowledge for social network attack and privacy preservation.  ...  EXPERIMENT EVALUATIONS We conduct de-anonymization and privacy inference experiments on two real world social network datasets and then we present a comprehensive evaluation on our methods, which validates  ... 
doi:10.1109/tdsc.2017.2697854 fatcat:g7p2dgdvxnb4hky63pv5kc7mlu

Social network topology: a Bayesian approach

C J Rhodes, E M J Keefe
2007 Journal of the Operational Research Society  
Here, a method based on Bayesian inference is presented that probabilistically infers the existence of links within a social network. It is tested on data from open source publications.  ...  The result of the analysis is a probabilistic network, that is a network that consists of known links (established through direct surveillance) and proposed links (established through probabilistic inference  ... 
doi:10.1057/palgrave.jors.2602352 fatcat:swxo6dbdovdendanxn5fxs3fbq

Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks [article]

Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay
2019 arXiv   pre-print
Here, we are introducing Granger Network inference as a new forecasting approach for individual infractions with demonstrated performance far surpassing past results, yet transparent enough to validate  ...  and extend social theory.  ...  Data on terror attacks was downloaded from the GTD (https://www.start.umd.edu/data-tools/global-terrorismdatabase-gtd), which is a database of incidents of terrorism from 1970 -2016.  ... 
arXiv:1911.05647v1 fatcat:64vjy6jvjzdnbmp5mh6icrjb3a

User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy [article]

Erfan Aghasian, Saurabh Garg, James Montgomery
2018 arXiv   pre-print
in online social networks.  ...  Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.  ...  As mentioned, each social network follows a different goal compared with other ones. Basically, social network sites can be categorized based on different purposes.  ... 
arXiv:1806.07629v1 fatcat:fbo7j4wq2jf6xmlqkxw2777sfe

Privacy in trajectory micro-data publishing : a survey [article]

Marco Fiore, Panagiota Katsikouli, Elli Zavou, Mathieu Cunche, Françoise Fessant, Dominique Le Hello, Ulrich Matchi Aivodji, Baptiste Olivier, Tony Quertier, Razvan Stanica
2020 arXiv   pre-print
This paper serves as an introductory reading on a critical subject in an era of growing awareness about privacy risks connected to digital services, and provides insights into open problems and future  ...  We classify and present the literature of attacks against trajectory micro-data, as well as solutions proposed to date for protecting databases from such attacks.  ...  The result is in fact merely probabilistic, as it is not based on actual ground truth (i.e., the identity -as social network username -of users in the trajectory micro-data): instead, a maximum a-posteriori  ... 
arXiv:1903.12211v3 fatcat:kyz7k56e6bcunkzmsdz7xdx5ri

Advances in Inference Control in Statistical Databases: An Overview [chapter]

Josep Domingo-Ferrer
2002 Lecture Notes in Computer Science  
Inference control in statistical databases is a discipline with several other names, such as statistical disclosure control, statistical disclosure limitation, or statistical database protection.  ...  Massive production of computerized statistics by government agencies combined with an increasing social importance of individual privacy has led to a renewed interest in this topic.  ...  "Extending cell suppression to protect tabular data against several attackers", by Salazar, points out that attackers to confidentiality need not be just external intruders; internal attackers, i.e. special  ... 
doi:10.1007/3-540-47804-3_1 fatcat:3wfmojfvpvbylb7gsznkb33rry

Privacy in Social Networks

Elena Zheleva, Evimaria Terzi, Lise Getoor
2012 Synthesis Lectures on Data Mining and Knowledge Discovery  
Acknowledgments The authors would like to thank Michael Hay and Ashwin Machanavajjhala for the invaluable and thorough feedback on this manuscript.  ...  One type of attack, which we call an attribute inference attack, assumes that an attribute is sensitive only for a subset of the users in the network and that the other users in the network are willing  ...  One can see suppression as a special case of generalization, and that suppressing all attributes would guarantee k-anonymity.  ... 
doi:10.2200/s00408ed1v01y201203dmk004 fatcat:x2zivcq7fjakbkkdayab5nuu2i

Anonymized Data: Generation, models, usage

Graham Cormode, Divesh Srivastava
2010 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)  
Essentially, anonymized data describes a set of possible worlds, one of which corresponds to the original data.  ...  They enable publication of detailed information, which permits ad hoc queries and analyses, while guaranteeing the privacy of sensitive information in the data against a variety of attacks.  ...  , which represents sensitive associations between entities (e.g., people in social networks).  ... 
doi:10.1109/icde.2010.5447721 dblp:conf/icde/CormodeS10 fatcat:q76eqshvongpbnzfsnebgzpmti

Anonymized data

Graham Cormode, Divesh Srivastava
2009 Proceedings of the 35th SIGMOD international conference on Management of data - SIGMOD '09  
Essentially, anonymized data describes a set of possible worlds, one of which corresponds to the original data.  ...  They enable publication of detailed information, which permits ad hoc queries and analyses, while guaranteeing the privacy of sensitive information in the data against a variety of attacks.  ...  , which represents sensitive associations between entities (e.g., people in social networks).  ... 
doi:10.1145/1559845.1559968 dblp:conf/sigmod/CormodeS09 fatcat:zstvbpoah5g5hiqim4fzi7crra

A Simple Model for Sequences of Relational State Descriptions [chapter]

Ingo Thon, Niels Landwehr, Luc De Raedt
2008 Lecture Notes in Computer Science  
It is based on CP-logic, an expressive probabilistic logic for modeling causality.  ...  Standard probabilistic sequence models provide efficient inference and learning techniques, but typically cannot fully capture the relational complexity.  ...  This work was supported by FWO-Vlaanderen, and the GOA/08/008 project "Probabilistic Logic Learning".  ... 
doi:10.1007/978-3-540-87481-2_33 fatcat:6ymfjy4lfbbvjck5mgnk3ysbxq

Evaluating the impact of k-anonymization on the inference of interaction networks

Pedro Rijo, Alexandre P. Francisco, Mário J. Silva
2016 Transactions on Data Privacy  
Moreover, the nature of academic data is such that many implicit social interaction networks can be derived from available datasets, either anonymized or not, raising the need for researching how anonymity  ...  We address the publication of a large academic information dataset while ensuring privacy.  ...  Acknowledgements A preliminary version of this work was presented at the ACM CIKM 2014 Workshop on Privacy and Security of Big Data (PSDB).  ... 
dblp:journals/tdp/RijoFS16 fatcat:z2zgaqgwcjbplcus4lai7gckqu
« Previous Showing results 1 — 15 out of 3,083 results