2019
DOI: 10.1007/s10618-019-00631-5
|View full text |Cite
|
Sign up to set email alerts
|

Robust active attacks on social graphs

Abstract: In order to prevent the disclosure of privacy-sensitive data, such as names and relations between users, social network graphs have to be anonymised before publication. Naive anonymisation of social network graphs often consists in deleting all identifying information of the users, while maintaining the original graph structure. Various types of attacks on naively anonymised graphs have been developed. Active attacks form a special type of such privacy attacks, in which the adversary enrols a number of fake us… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
42
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(43 citation statements)
references
References 45 publications
1
42
0
Order By: Relevance
“…-We prove that the algorithm K-Match, devised to ensure a sufficient condition for k-automorphism, also guarantees k-symmetry. -We provide empirical evidence on the effectiveness of K-Match as an anonymisation strategy against the strongest active attack reported in the literature, namely the robust active attack presented in [32], even when it leverages a large number of sybil nodes.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…-We prove that the algorithm K-Match, devised to ensure a sufficient condition for k-automorphism, also guarantees k-symmetry. -We provide empirical evidence on the effectiveness of K-Match as an anonymisation strategy against the strongest active attack reported in the literature, namely the robust active attack presented in [32], even when it leverages a large number of sybil nodes.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…5 that the algorithm K-Match efficiently provides a sufficient condition for ksymmetry. Finally, we empirically demonstrate the effectiveness of K-Match against the robust active attack from [32] in Sect. 6 and give our conclusions in Sect.…”
Section: Structure Of the Papermentioning
confidence: 99%
See 2 more Smart Citations
“…These are motivated by the observed interaction and homophily between network structure and node attributes. An active attack on privacy-preserving publication of social graphs is presented in [19]. Demographic variable attacks on Twitter users based on whom they follow are presented in [4].…”
Section: Related Workmentioning
confidence: 99%