A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detecting and predicting privacy violations in online social networks
2013
Distributed and parallel databases
We have developed PROT OSS, a run time tool for detecting and predicting PRivacy viOlaT ions in Online Social networkS. ...
In addition to detection, PROT OSS can predict possible future violations by feeding in a hypothetical future world state. ...
Accordingly, we propose PROT OSS, a run time tool to detect and predict possible privacy breaches in online social networks. ...
doi:10.1007/s10619-013-7124-8
fatcat:sooik3qdhfacxi2r5cabyxitva
Special issue on secure and privacy-aware data management
2014
Distributed and parallel databases
This special issue presents high quality solution ideas related to the secure and privacy-aware data management challenges occurring in different application domains, such as online social networks, location ...
Many applications ranging from social networking to mobile phones create large amounts of potentially sensitive information related to individuals. ...
The sixth paper: Detecting and Predicting Privacy Violations in Online Social Networks by Ozgur Kafali, Akin Gunay, and Pinar Yolum deals with detecting and preventing privacy violations in online social ...
doi:10.1007/s10619-014-7144-z
fatcat:zmzwdba6yvfrpcv6gbzufizg6i
Automatic Generation of Explanations to Prevent Privacy Violations
2019
International Conference on Legal Knowledge and Information Systems
With the massive use of online social environments and technologies, users' concern regarding the privacy of their own data has significantly increased. ...
This method uses the available data from the network to anticipate any potential privacy violation, automatically generates explanations, and shows them to the user with the purpose of avoiding the detected ...
Acknowledgements This work is partially supported by the Spanish Government project TIN2017-89156-R, the FPI grant BES-2015-074498, and the Valencian Government project PROME-TEO/2018/002. ...
dblp:conf/jurix/Ruiz-DolzAHG19
fatcat:wahbevqddze6jp3adty6anfz4q
PriGuard: A Semantic Approach to Detect Privacy Violations in Online Social Networks
2016
IEEE Transactions on Knowledge and Data Engineering
Our categorization yields that the privacy violations in online social networks stem from intricate interactions and detecting these violations requires semantic understanding of events. ...
Accordingly, this paper first categorizes the privacy violations that take place in online social networks. ...
Using the meta-model, we formally define agent-based social networks, privacy requirements, and privacy violations in online social networks. ...
doi:10.1109/tkde.2016.2583425
fatcat:z3zufcz6nfdhnairer7y4vtz5i
Security techniques for intelligent spam sensing and anomaly detection in online social platforms
2020
International Journal of Electrical and Computer Engineering (IJECE)
In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks ...
Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos ...
CONCLUSION In this paper, we addressed the important issue of security and privacy in Online Social Networks. ...
doi:10.11591/ijece.v10i1.pp275-287
fatcat:hucpuhkbhfam5efmyjva3l2iki
GUEST EDITORIAL: Special Issue on Social Sensing and Privacy Computing in Intelligent Social Systems
2020
IEEE Transactions on Computational Social Systems
The article entitled "Community Detection in Online Social Networks: A Differentially Private and Parsimonious Approach" by Ji et al. investigated community detection in social networks aiming to protect ...
Community detection is an effective approach to unveil relationships among individuals in online social networks. ...
doi:10.1109/tcss.2020.2970304
fatcat:heirossfwbcafnzaz5gnqeaiqe
AI Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases
2021
Applied Sciences
Since there are growing concerns regarding online privacy, firms may have the risk of being involved in various privacy infringement cases resulting in legal causations. ...
We also examined the relationship between privacy infringement factors and adjudications by applying network text analysis. ...
Algorithms for Protecting Online Privacy Research on online privacy has focused on personal information that can be leaked in an e-commerce environment and online social networks [9] . ...
doi:10.3390/app112311080
fatcat:sq2hlz2w3bepfaetrv56smuuvm
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images
[article]
2017
arXiv
pre-print
Third, we propose models that predict user specific privacy score from images in order to enforce the users' privacy preferences. ...
First, we categorize personal information in images into 68 image attributes and collect a dataset, which allows us to train models that predict such information directly from images. ...
We thank Paarijaat Aditya, Philipp Müller and Julian Steil for advice on the user study. We also thank Dr. Mykhaylo Andriluka and Seong Joon Oh for valuable feedback on the paper. ...
arXiv:1703.10660v2
fatcat:7goroqiu35cghmj2hdfi7jxiqy
Pixel Privacy: Increasing Image Appeal while Blocking Automatic Inference of Sensitive Scene Information
2018
MediaEval Benchmarking Initiative for Multimedia Evaluation
We introduce a new privacy task focused on images that users share online. ...
The task benchmarks image transformation algorithms that are capable of blocking the ability of automatic classifiers to infer sensitive information in images. ...
The motivation for the Pixel Privacy task is the growing concern about the information implicit in the user data that is shared online, and in particular, in the data accumulated by large social networks ...
dblp:conf/mediaeval/LarsonLBZ18
fatcat:xgl6zurmuvgangi4jutxqjbs4u
Methods of Profile Cloning Detection in Online Social Networks
2016
MATEC Web of Conferences
In this paper an attempt was made to present a concept of profile cloning detection in Online Social Networks (OSN) using Graph and Networks Theory. ...
With the arrival of online social networks, the importance of privacy on the Internet has increased dramatically. ...
The complexity of the considerations about violating privacy in Online Social Networks intensifies the phenomenon of social network aggregation. ...
doi:10.1051/matecconf/20167604013
fatcat:33lpop6a7narpo4iagv4cdf6tu
Layering privacy on operating systems, social networks, and other platforms by design
2010
Identity in the Information Society
3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services ...
Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. ...
Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided ...
doi:10.1007/s12394-010-0057-8
fatcat:nxco3p2nfvenvfgizcdgt6qtoe
Conflict Detection Techniques for Preserving Privacy in Social Media
2018
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media. ...
Some users over CSS affect user's privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user's inherent trust in their relationship ...
Strater et al. have evolved Online Social Network (OSN). ...
doi:10.32628/cseit183827
fatcat:4u3u22dtvfbpphtbkihbzyhrty
Survey on Privacy Policy Specification System for User Uploaded Images Over Popular Content Sharing Sites
2017
International Journal for Research in Applied Science and Engineering Technology
This information needs to remain private and each social network owns a privacy policy that describes in-depth how user's information is managed and published. ...
The regular use of social networking websites and application encompasses the collection and retention of personal and very often sensitive information about users. ...
Sharing images within online content sharing sites, therefore, may quickly lead to unwanted revelation and privacy violations. ...
doi:10.22214/ijraset.2017.2070
fatcat:a3uhplpq4jbftkx34x4f5ds3ca
Key Players Identification in Social Network for Preventing Private Information Leakage
English
2014
International Journal of Computer Trends and Technology
English
Online social networks namely Facebook, Twitter are highly utilized by various people. ...
Current research uses key node identification framework in a network by using KPP-POS and KPP-NEG is described for finding sets of key players in a social network. ...
The discovery of information and relationships from social network data without violating privacy is done by mining of data of privacy-preserving social network. ...
doi:10.14445/22312803/ijctt-v10p128
fatcat:owtntlwfxvezhokmleczeguvn4
Social Media Fake Account Detection for Afan Oromo Language using Machine Learning
2020
New Media and Mass Communication
In this work we propose new model using machine learning and NLP (Natural Language Processing) techniques to enhance the accuracy rate in detecting the fake identities in online social networks. ...
Smruthi, , February 2019).Online social networking sites became an important means in our daily life. Millions of users register and share personal information with others. ...
As the expansion of greater security in online social networking sites it turned to be very hard to encroach into online social networks. ...
doi:10.7176/nmmc/90-01
fatcat:agdvymucizh7rm4rvejk3kd3ye
« Previous
Showing results 1 — 15 out of 13,764 results