Ahmed et al., 2019 - Google Patents
Publishing social network graph eigenspectrum with privacy guaranteesAhmed et al., 2019
View PDF- Document ID
- 16654915998918877953
- Author
- Ahmed F
- Liu A
- Jin R
- Publication year
- Publication venue
- IEEE Transactions on Network Science and Engineering
External Links
Snippet
Online social networks (OSNs) often refuse to publish their social network graphs due to privacy concerns. Recently, differential privacy has become the widely accepted criteria for privacy preserving data publishing. Although some work has been done on publishing …
- 239000011159 matrix material 0 abstract description 117
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmed et al. | Publishing social network graph eigenspectrum with privacy guarantees | |
Sajadmanesh et al. | {GAP}: Differentially private graph neural networks with aggregation perturbation | |
Rossi et al. | On proximity and structural role-based embeddings in networks: Misconceptions, techniques, and applications | |
Vangipuram et al. | A machine learning approach for imputation and anomaly detection in IoT environment | |
Ren et al. | $\textsf {LoPub} $: high-dimensional crowdsourced data publication with local differential privacy | |
Zhu et al. | Differential privacy and applications | |
Torra | Data privacy: foundations, new developments and the big data challenge | |
Abawajy et al. | Privacy preserving social network data publication | |
Papalexakis et al. | Network anomaly detection using co-clustering | |
Li et al. | Private graph data release: A survey | |
Senator et al. | Detecting insider threats in a real corporate database of computer usage activity | |
Zhou et al. | A brief survey on anonymization techniques for privacy preserving publishing of social network data | |
Sala et al. | Sharing graphs using differentially private graph models | |
Kent et al. | Authentication graphs: Analyzing user behavior within an enterprise network | |
Dwork | A firm foundation for private data analysis | |
Ahmed et al. | A random matrix approach to differential privacy and structure preserved social network graph publishing | |
Wang et al. | Locally private high-dimensional crowdsourced data release based on copula functions | |
Ji et al. | Community detection in online social networks: A differentially private and parsimonious approach | |
Zorarpacı et al. | Privacy preserving classification over differentially private data | |
Ahmed et al. | Social graph publishing with privacy guarantees | |
Golsefid et al. | Fuzzy community detection model in social networks | |
Bajtoš et al. | Network intrusion detection with threat agent profiling | |
Zhu et al. | Community detection across multiple social networks based on overlapping users | |
Feng et al. | Influence maximization with fairness at scale | |
Bonchi et al. | Privacy in spatiotemporal data mining |