4.3 Article

A privacy-sensitive data identification model in online social networks

Related references

Note: Only part of the references are listed.
Article Telecommunications

BPRT: A blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages

Shuang Yao et al.

Summary: This paper proposes a blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages. The scheme ensures transaction confidentiality, receiver anonymity, and audit reliability, while protecting the privacy of transaction contents and avoiding exposure of user identity information.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2023)

Article Telecommunications

Privacy-preserving blockchain-based contract signing with multi-party supervision

Tong Zhang et al.

Summary: This article proposes a privacy-preserving blockchain-based contract signing system with multi-party supervision. By using identity authentication and encryption algorithms, the privacy and access control of the contract can be ensured. Security analysis shows that the system enjoys unforgeability, non-repudiation, and fairness of electronic contract signing.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Telecommunications

Safeguarding cross-silo federated learning with local differential privacy

Chen Wang et al.

Summary: This study proposes a three-plane framework to secure cross-silo FL by utilizing the LDP mechanism. Experimental results demonstrate the effectiveness of the framework.

DIGITAL COMMUNICATIONS AND NETWORKS (2022)

Article Computer Science, Artificial Intelligence

Towards link inference attack against network structure perturbation

Xingping Xian et al.

Summary: The increasing popularity and diversity of social media sites have led to the emergence of a growing number of social networks, which serve as a source of information for researchers and advertisers to understand user social activities. Various network structure perturbation methods have been proposed to protect sensitive user data, but there is currently a lack of robustness studies on link prediction-based hidden inference structure methods.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Computer Science, Information Systems

Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey

Kai Peng et al.

Summary: This article provides a comprehensive review of the security challenges and research opportunities associated with deploying smart contracts in an IoT setting, serving as a starting point for readers interested in exploring the potential applications of smart contracts.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Computer Science, Information Systems

Privacy Inference Attack Against Users in Online Social Networks: A Literature Review

Yangheran Piao et al.

Summary: As social networks continue to expand, the protection of personal information becomes increasingly crucial. Privacy inference attacks in social networks involve inferring users' private information through their social interactions and shared content, highlighting advancements in this area of research.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

Zuoguang Wang et al.

Summary: This paper introduces a conceptual model to describe how social engineering attacks work, identifying core entities and aspects to understand the success of these attacks. It also offers materials for security awareness training and future empirical research, as well as aiding in the development of a domain ontology of social engineering in cybersecurity.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model

Jianwei Qian et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine

Yuhong Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Cyber Security in Social Media: Challenges and the Way Forward

Kutub Thakur et al.

IT PROFESSIONAL (2019)

Article Computer Science, Information Systems

DeepAttr: Inferring Demographic Attributes via Social Network Embedding

Xucheng Luo et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance

Jian Mao et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks

Zhipeng Cai et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Information Systems

Attribute Inference Attacks in Online Social Networks

Neil Zhenqiang Gong et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Proceedings Paper Computer Science, Information Systems

Online Processing Algorithms for Influence Maximization

Jing Tang et al.

SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2018)

Proceedings Paper Computer Science, Information Systems

AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields

Jinyuan Jia et al.

PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) (2017)

Article Computer Science, Information Systems

Social engineering attack examples, templates and scenarios

Francois Mouton et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

A Survey on Vehicular Social Networks

Anna Maria Vegni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Artificial Intelligence

Preventing Private Information Inference Attacks on Social Networks

Raymond Heatherly et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)