1 |
N. Z. Gong et al., Joint link prediction and attribute inference using a social-attribute network, ACM Trans. Intell. Syst. Technol. (TIST) 5 (2014), 27.
|
2 |
M. B. Islam et al., A greater understanding of social networks privacy requirements: The user perspective, J. Inf. Sec. Appl. 33 (2017), 30-44.
DOI
|
3 |
I. F. Lam, K. T. Chen, and L. J. Chen, Involuntary information leakage in social network services, in International Workshop on Security, vol. 5312, Springer, Berlin, Germany, 2008, pp. 167 -183.
|
4 |
R. Dey et al., Estimating age privacy leakage in online social networks, in Proc. INFOCOM (Orlando, FL, USA), Mar. 2012, pp. 2836-2840.
|
5 |
K. Liang et al., Privacy concerns for photo sharing in online social networks, IEEE Internet Comput. 19 (2015), 58-63.
|
6 |
E. M. Maximilien et al., Privacy-as-a-service: Models, algorithms, and results on the Facebook platform, in Proc. Web 2.0 Sec. Priv. Workshop, vol. 2, 2009.
|
7 |
K. Liu and E. Terzi, A framework for computing the privacy scores of users in online social networks, ACM Trans. Knowl. Discov. Data 5 (2010), 6.
|
8 |
Z. He, Z. Cai, and J. Yu, Latent-data privacy preserving with customized data utility for social network data, IEEE Trans. Veh. Technol. 67 (2018), 665-673.
DOI
|
9 |
Z. He, Z. Cai, and X. Wang, Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks, in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS) (Columbus, OH, USA), July 2015, pp. 205-214.
|
10 |
M. Bartsch and T. Dienlin, Control your facebook: An analysis of online privacy literacy, Comput. Hum. Behav. 56 (2016), 147-154.
DOI
|
11 |
J. Jiang, Personal information leakage on the rise in China: Report, 2017, available at http://en.people.cn/n3/2017/0331/c9000 0-9197748.html [last accessed 31 March 2017].
|
12 |
C. Joshi and U. K. Singh, Information security risks management framework- A step towards mitigating security risks in university network, J. Inf. Sec. Appl. 35 (2017), 128-137.
DOI
|
13 |
J. Ge, J. Peng, and Z. Chen, Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD), in Proc. IEEE Int. Conf. Cogn. Inf. Cogn. Comput. (ICCI* CC) (London, UK), Aug. 2014, pp. 329-336.
|
14 |
A. De Salve et al., Discovering homophily in online social networks, Mob. Netw. Appl. 23 (2018), 1715-1726.
DOI
|
15 |
R. K. Wong and B. S. Vidyalakshmi, Privacy leakage via attribute inference in directed social networks, in Information and Communications Security, Springer, Cham, Switzerland, 2016, pp. 333-346.
|
16 |
F. Al Zamal, W. Liu, and D. Ruths, Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors, in Proc. Int. AAAI Conf. Weblogs Soc. Media (Dublin, Ireland), June 2012.
|
17 |
L. Fang and K. LeFevre, Privacy wizards for social networking sites, in Proc. Int. Conf. World Wide Web (Raleigh, NC, USA), Apr. 2010, pp. 351-360.
|
18 |
T. Dienlin and S. Trepte, Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors, Eur. J. Soc. Psychol. 45 (2015), 285-297.
DOI
|
19 |
Q. Fang et al., Relational user attribute inference in social media, IEEE Trans. Multimedia 17 (2015), 1031-1044.
DOI
|
20 |
N. Z. Gong and B. Liu, You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors, in Proc. USENIX Sec. Symp. (Austin, TX, USA), Aug. 2016, pp. 979- 995.
|
21 |
N. Z. Gong and B. Liu, Attribute inference attacks in online social networks, ACM Trans. Priv. Sec. 21 (2018), 1-30, article no. 3.
|
22 |
A. Srivastava and G. Geethakumari, Measuring privacy leaks in online social networks, in Proc. Int. Conf. Adv. Comput, Comm. Inf. (ICACCI), (Mysore, India), Aug. 2013, pp. 2095-2100.
|
23 |
G. Jeh and J. Widom, SimRank: A measure of structural-context similarity, in Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min. (Edmonton, Canada), July 2019, pp. 538-543.
|
24 |
R. G. Pensa and G. Di Blasi, A privacy self-assessment framework for online social networks, Expert Syst. Appl. 86 (2017), 18-31.
DOI
|
25 |
J. L. Becker and H. Chen, Measuring privacy risk in online social networks, Int. J. Secur., Priv. Trust Manag. 4 (2009), 2095-2100.
|
26 |
K. Thomas, C. Grier, and D. M. Nicol, Unfriendly: Multi-party privacy risks in social networks, in Privacy Enhancing Technologies, vol. 6205, Springer, Berlin, Heidelberg, 2010, pp. 236-252.
|
27 |
K. Li, X. Lin, and X. Wang, An empirical analysis of users' privacy disclosure behaviors on social network sites, Inf. Manag. 52 (2015), 882-891.
DOI
|
28 |
S. Jain and S. K. Raghuwanshi, Fine grained privacy measuring of user's profile over online social network, in Intelligent Communication and Computational Technologies, vol. 19, Springer, Singapore, Singapore, pp. 371-379.
|
29 |
M. Li, Z. Liu, and K. Dong, Privacy preservation in social network against public neighborhood attacks, in Proc. Trustcom/BigDataSE/ISPA (Tianjin, China), Aug. 2016, pp. 1575-1580.
|
30 |
Y. Wang, R. K. Nepali, and J. Nikolai, Social network privacy measurement and simulation, in Proc. Int. Conf. Comput., Netw. Commun. (ICNC) (Honolulu, HI, USA), Feb. (2014), 802-806.
|
31 |
Y. Alsarkal, N. Zhang, and H. Xu, Your privacy is your friend's privacy: examining interdependent information disclosure on online social networks, in Proc. Hawaii Int. Conf. Syst. Sci. (Waikoloa, HI, USA), Jan. 2018.
|
32 |
K. M. Altenburger and J Ugander, Monophily in social networks introduces similarity among friends-of-friends, Nat. Hum. Behav. 2 (2018), no. 4, 284.
DOI
|
33 |
C. Patsakis et al., Distributing privacy policies over multimedia content across multiple online social networks, Comput. Netw. 75 (2014), 531-543.
DOI
|
34 |
Y. Zeng et al., Trust-aware privacy evaluation in online social networks, in Proc. IEEE Int. Conf. Commun. (ICC) (Sydney, Australia), June 2014, pp. 932-938.
|
35 |
E. Aghasian et al., Scoring users' privacy disclosure across multiple online social networks, IEEE Access 5 (2017), 13118-13130.
DOI
|
36 |
K. Renaud and S. Flowerday, Contemplating human-centred security & privacy research: Suggesting future directions, J. Inf. Sec. Appl. 34 (2017), 76-81.
DOI
|
37 |
W Wang et al., Coevolution spreading in complex networks, Phy. Rev. 820 (2019), 1-51.
|
38 |
W. Wang, H. E. Stanley, and L. A. Braunstein, Effects of time-delays in the dynamics of social contagions, New J. Phy. 20 (2017), 013034.
DOI
|
39 |
W. Wang et al., Containing misinformation spreading in temporal social networks, Chaos 29 (2019), 123131.
DOI
|
40 |
K. Lei et al., Understanding user behavior in sina weibo online social network: A Community Approach, IEEE Access 6 (2018), 13302-13316.
DOI
|
41 |
X. Li et al., A privacy measurement framework for multiple online social networks against social identity linkage, Appl. Sci. 8 (2018), 1790.
DOI
|