共 16 条
[1]
Backstrom L., Dwork C., Kleinberg J., Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography, WWW 2007, (2007)
[2]
Narayanan A., Shmatikov V., De-anonymizing Social Networks, S&P 2009, (2009)
[3]
Srivatsa M., Hicks M., Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel, CCS 2012, (2012)
[4]
Narayanan A., Shmatikov V., Robust De-anonymization of Large Sparse Datasets (De-anonymizing the Netflix Prize Dataset), S&P 2008, (2008)
[5]
Goodin D., Poorly anonymized logs reveal NYC cab drivers detailed whereabouts
[6]
Singh K., Bhola S., Lee W., xBook: Redesigning Privacy Control in Social Networking Platforms, USENIX 2009, (2009)
[7]
Hornyack P., Han S., Jung J., Schechter S., Wetherall D., “These Aren’t the Droids You’re Looking For”: Retrofitting Android to Protect Data from Imperious Applications, CCS 2011, (2011)
[8]
Egele M., Kruegel C., Kirda E., Vigna G., PiOS: Detecting Privacy Leaks in iOS Applications, NDSS 2011, (2011)
[9]
Opsahl T., Agneessens F., Skvoretz J., Node Centrality in Weighted Networks: Generalizing Degree and Shortest Paths, Social Networks, 32, pp. 245-251, (2010)
[10]
Gong N.Z., Talwalkar A., Mackey L., Huang L., Shin E.C.R., Stefanov E., Shi E., Song D., Jointly Predicting Links and Inferring Attributes using a Social- Attribute Network (SAN), SNA-KDD 2012, (2012)