Filters








1,467 Hits in 6.4 sec

De-Health: All Your Online Health Information Are Belong to Us [article]

Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Qinming He, Raheem Beyah, Ting Wang
2019 arXiv   pre-print
By employing both candidate selection and DA verification schemes, De-Health significantly reduces the DA space by several orders of magnitude while achieving promising DA accuracy.  ...  De-Health consists of two phases: Top-K DA, which identifies a candidate set for each anonymized user, and refined DA, which de-anonymizes an anonymized user to a user in its candidate set.  ...  Let Y be the number of anonymized users that have true mappings in ∆ 2 and Y c be the number of anonymized users that have true mappings in ∆ 2 and are successfully de-anonymized by algorithm A.  ... 
arXiv:1902.00717v2 fatcat:xsr4swglujhtjnjdtp35mhgcpm

Security Analysis of Malicious Socialbots on the Web

Yazan Boshmaf
2015 Zenodo  
Based on these findings, we designed Integro—an infiltration-resilient defense system that helps OSNs detect automated fake accounts via a user ranking scheme.  ...  In particular, Integro relies on a novel approach that leverages victim classification for robust graph-based fake account detection, with provable security guarantees.  ...  Second, this work would have been no fun without my fabulous collaborators and supportive friends. In no particular order, I give my special thanks to you all:  ... 
doi:10.5281/zenodo.3264693 fatcat:q3rntvj5gjdzhnhykysnuauihe

Implementation of international standards of virtual assets market regulation in Ukraine
Упровадження міжнародних стандартів регулювання ринку віртуальних активів в Україні

Tetyana DMYTRENKO, The Educational and Scientific Institute of the International Economics and Finance of the Interregional Academy of Personnel Management, Oleksandr LYUBICH, SESE "The Academy of Financial Management"
2020 Fìnansi Ukraïni  
becomes even more incredible when you realize that the data above reflects just six individual Ponzi schemes in 2019.  ...  More anonymous P2P exchange options.  ... 
doi:10.33763/finukr2020.09.065 fatcat:j7koxcg6nnhg5du7xb5ayxtvzq

Predicting links in ego-networks using temporal information

Lionel Tabourier, Anne-Sophie Libert, Renaud Lambiotte
2016 EPJ Data Science  
In this work, we are interested in ego-networks, that is the mere information of interactions of a node to its neighbors, in the context of social relationships.  ...  However, the trends identified previously remain true with the other classes.  ...  Let us recall that the Fano factor of a distribution is the ratio of its variance over its mean.  ... 
doi:10.1140/epjds/s13688-015-0062-0 fatcat:xgxcbojcpvglrdfd4twhsdpjh4

Session reports for SIGCOMM 2010

Shailesh Agrawal, Immanuel Ilavarasan Thomas, Arun Vishwanath, Tianyin Xu, Fang Yu, Kavitha Athota, Pramod Bhatotia, Piyush Goyal, Phani Krisha, Kirtika Ruchandan, Nishanth Sastry, Gurmeet Singh (+1 others)
2011 Computer communication review  
. • Problems with bridges: "If you cannot keep up with the wire speeds, you are not allowed to be a bridge". • Views on why IP is suboptimal ("why not replace bridges with IP routers?")  ...  With bridges we did such a good job and it was so plug-and-play that you didn't have to think about them, so people are still taking large networks and doing bridges.  ...  over multiple hops, so you are never sure if the neighboring node is the true content requester or server.  ... 
doi:10.1145/1925861.1925873 fatcat:jpaoo55h75hprb5k2vlkin5zzi

Journalism as usual: The use of social media as a newsgathering tool in the coverage of the Iranian elections in 2009

Megan Knight
2012 Journal of Media Practice  
Frenemy Google is often dubbed the frenemy of news organisations: half friend and half enemy.  ...  Sometimes the desire to have a story be true can blind you to the judgement of whether it actually is true.  ...  Most blogs, social bookmarking and networking sites or content-management systems will let you add keyword tags. These help you, and others, order and sort content in a way that suits you.  ... 
doi:10.1386/jmpr.13.1.61_1 fatcat:abhz6rqlffdzdklr25gm5d4anq

29th International Conference on Data Engineering [book of abstracts]

2013 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)  
Our system acts as a decision aid --we give insight into why each friend was recommended and let the user decide whom to contact.  ...  I wish you a successful conference and hope you enjoy your stay in Queensland's capital city.  ... 
doi:10.1109/icdew.2013.6547409 fatcat:wadzpuh3b5htli4mgb4jreoika

Performance pay and worker cooperation: Evidence from an artefactual field experiment

Stephen Burks, Jeffrey Carpenter, Lorenz Goette
2009 Journal of Economic Behavior and Organization  
lend small amounts to friends; How often do you give to panhandlers; I let messengers who work hard know that I appreciate them; If the weather is bad, I sometimes take it easy. 6 All experiments were  ...  Our goal was to see if social preferences are endogenous to whether the compensation scheme involved performance pay.  ... 
doi:10.1016/j.jebo.2008.02.012 fatcat:74f6lpyejzbedpk4mje6th2r54

The knowledge graph as the default data model for learning on heterogeneous knowledge

Xander Wilcke, Peter Bloem, Victor de Boer, Michel Dumontier
2017 Data Science  
Attributes can be simple strings, such as names and social security numbers, but also richer media like short biographies, photographs, promotional videos or recorded interviews.  ...  graph as the default data model for this kind of knowledge and b) develop end-to-end models that can directly consume these knowledge graphs.  ...  . / The knowledge graph as the default data model for learning on heterogeneous knowledge Acknowledgements.  ... 
doi:10.3233/ds-170007 dblp:journals/datasci/WilckeBB17 fatcat:o5hclal77zayheldkar3lb3hf4

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
In this paper we propose concept of bridging socially enhanced virtual communities.  ...  our project mentor, Prof.G.G.Chiddarwar for her valuable suggestions and guidance throughout our course of study and timely help given to us in the completion of our project titled, 'Video Watermarking scheme  ...  Later, they began to be true WYSIWYG (what you see is what you get) environments for creating Web pages.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Panning for gold: Automatically analysing online social engineering attack surfaces

Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid, Alistair Baron
2017 Computers & security  
Individuals are increasingly releasing information about themselves online, particularly on social networks.Though existing research has demonstrated the social engineering risks posed by such open source  ...  Secondly, we show that, once identified, employee profiles can be linked across multiple online social networks to harvest additional information pertinent to successful social engineering attacks.  ...  Friends Subclassifier A person's social graph in one social network is likely to resemble their social graph in another.  ... 
doi:10.1016/j.cose.2016.12.013 fatcat:nm7hxzicjfeidgtqohiglch3ne

A survey of results on mobile phone datasets analysis

Vincent D Blondel, Adeline Decuyper, Gautier Krings
2015 EPJ Data Science  
This area of research has emerged a decade ago, with the increasing availability of large-scale anonymized datasets, and has grown into a stand-alone topic.  ...  We survey the contributions made so far on the social networks that can be constructed with such data, the study of personal mobility, geographical partitioning, urban planning, and help towards development  ...  . [] used different randomization schemes to show that even though social networks have a typical small-world topology, the temporal sequence of events significantly slows down the spreading of information  ... 
doi:10.1140/epjds/s13688-015-0046-0 fatcat:oxo3bjnfb5h4tckgdzwydu2mau

A survey of results on mobile phone datasets analysis [article]

Vincent D. Blondel, Adeline Decuyper, Gautier Krings
2015 arXiv   pre-print
This area of research has emerged a decade ago, with the increasing availability of large-scale anonymized datasets, and has grown into a stand-alone topic.  ...  We will survey the contributions made so far on the social networks that can be constructed with such data, the study of personal mobility, geographical partitioning, urban planning, and help towards development  ...  [75] used different randomization schemes to show that even though social networks have a typical small-world topology, the temporal sequence of events significantly slows down the spreading of information  ... 
arXiv:1502.03406v1 fatcat:akca6vnmtfbihp5nqotnz3rvpq

Modeling and Data Mining in Blogosphere

Nitin Agarwal, Huan Liu
2009 Synthesis Lectures on Data Mining and Knowledge Discovery  
Examples include blogs, wikis, social annotation and tagging, media sharing, and various other such services.  ...  The members at the Social Computing Group, Data Mining and Machine Learning Lab at ASU made this project much easier and enjoyable.  ...  Those members whom you follow are considered your "friends".  ... 
doi:10.2200/s00213ed1v01y200907dmk001 fatcat:ifz4ic57sfcwbltrboans35zzm

Learning to de-anonymize social networks

Kumar Sharad, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, Ross Anderson
2017
Moving on, we demonstrate the versatility and greater applicability of the proposed model by using it to solve the long-standing problem of benchmarking social graph anonymization schemes.  ...  Our work extends the vast literature of social graph de-anonymization attacks by systematizing them.  ...  True friends let you down: Benchmarking social graph anonymization schemes.  ... 
doi:10.17863/cam.6699 fatcat:hn6cdv5cxjbufbo6gahlxl2boq
« Previous Showing results 1 — 15 out of 1,467 results