Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3901 - 3930 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Modeling Contextual Agreement In Preferences, Ha Loc Do, Hady Wirawan Lauw
Modeling Contextual Agreement In Preferences, Ha Loc Do, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
Personalization, or customizing the experience of each individual user, is seen as a useful way to navigate the huge variety of choices on the Web today. A key tenet of personalization is the capacity to model user preferences. The paradigm has shifted from that of individual preferences, whereby we look at a user's past activities alone, to that of shared preferences, whereby we model the similarities in preferences between pairs of users (e.g., friends, people with similar interests). However, shared preferences are still too granular, because it assumes that a pair of users would share preferences across all items. We …
Celebrowser: An Example Of Browsing Big Data On Small Device, Song Tan, Chong-Wah Ngo, Jun Xu, Yong Rui
Celebrowser: An Example Of Browsing Big Data On Small Device, Song Tan, Chong-Wah Ngo, Jun Xu, Yong Rui
Research Collection School Of Computing and Information Systems
In this demonstration, we demonstrate a mobile-based celebrity video browsing system called CeleBrowser. Using this system, users can interactively switch among four views: people-centric, timeline-centric, month-centric and topic-centric, for browsing celebrity-related hot videos. A peculiarity of the demonstration is to highlight the advantage of multiperspective information organization and presentation in engaging users for exploratory browsing of large number of Web videos on a device with small screen. Technology-wise the demonstration shows how query logs collected for six months from two vertical search engines are leveraged for mining hot events and videos of celebrities.
Community Discovery In Social Networks Via Heterogeneous Link Association And Fusion, Lei Meng, Ah-Hwee Tan
Community Discovery In Social Networks Via Heterogeneous Link Association And Fusion, Lei Meng, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Discovering social communities of web users through clustering analysis of heterogeneous link associations has drawn much attention. However, existing approaches typically require the number of clusters a prior, do not address the weighting problem for fusing heterogeneous types of links and have a heavy computational cost. In this paper, we explore the feasibility of a newly proposed heterogeneous data clustering algorithm, called Generalized Heterogeneous Fusion Adaptive Resonance Theory (GHF-ART), for discovering communities in heterogeneous social networks. Different from existing algorithms, GHF-ART performs real-time matching of patterns and one-pass learning which guarantee its low computational cost. With a vigilance parameter to …
Cimloc: A Crowdsourcing Indoor Digital Map Construction System For Localization, Xiuming Zhang, Yunye Jin, Hwee Xian Tan, Wee-Seng Soh
Cimloc: A Crowdsourcing Indoor Digital Map Construction System For Localization, Xiuming Zhang, Yunye Jin, Hwee Xian Tan, Wee-Seng Soh
Research Collection School Of Computing and Information Systems
Indoor maps, as crucial prerequisites for many indoor localization and navigation systems, are sometimes inaccessible. The absence of an indoor map database and the high cost of manually constructing an indoor map produce a need for an inexpensive and efficient way to dynamically construct indoor maps. The ubiquity of sensor-equipped mobile devices enables us to crowdsource user trajectories, out of which indoor digital maps can be automatically constructed at low costs. Similar to other crowdsourced data, the collected user trajectories are often noisy and of low fidelity, which poses a challenge to the accurate map construction. To alleviate this problem, …
Laser: A Living Analytics Experimentation System For Large-Scale Online Controlled Experiments, Kwan-Hui Lim, Ee Peng Lim, Achananuparp Palakorn, Adrian Vu, Agus Trisnajaya Kwee, Feida Zhu
Laser: A Living Analytics Experimentation System For Large-Scale Online Controlled Experiments, Kwan-Hui Lim, Ee Peng Lim, Achananuparp Palakorn, Adrian Vu, Agus Trisnajaya Kwee, Feida Zhu
Research Collection School Of Computing and Information Systems
Tracking user browsing data and measuring the effectiveness of website design and web services are important to businesses that want to attract the consumers today who spend much more time online than before. Instead of using randomized controlled experiments, the existing approach simply tracks user browsing behaviors before and after a change is made to website design or web services, and evaluate the differences. To address the effects caused by hidden factors (e.g. promotion activities on the website) and to give fair comparison of different website designs, we propose the LASER system, a unified experimentation platform that enables randomized online …
Just-For-Me: An Adaptive Personalization System For Location-Aware Social Music Recommendation, Zhiyong Cheng, Jialie Shen
Just-For-Me: An Adaptive Personalization System For Location-Aware Social Music Recommendation, Zhiyong Cheng, Jialie Shen
Research Collection School Of Computing and Information Systems
The fast growth of online communities and increasing popularity of internet-accessing smart devices have significantly changed the way people consume and share music. As an emerging technology to facilitate effective music retrieval on the move, intelligent recommendation has been recently received great attentions in recent years. While a large amount of efforts have been invested in the field, the technology is still in its infancy. One of the major reasons for this stagnation is due to inability of the existing approaches to comprehensively take multiple kinds of contextual information into account. In the paper, we present a novel recommender system …
Technological, Organizational, And Environmental Factors Affecting The Adoption Of Cloud Enterprise Resource Planning (Erp) Systems, John Njenga Kinuthia
Technological, Organizational, And Environmental Factors Affecting The Adoption Of Cloud Enterprise Resource Planning (Erp) Systems, John Njenga Kinuthia
Master's Theses and Doctoral Dissertations
The purpose of this study was to determine the differences between organizations that adopted Cloud Enterprise Resource Planning (Cloud ERP) systems and organizations that did not adopt Cloud ERP systems based on the Technological, Organizational, and Environmental (TOE) factors. Relevant technological factors were identified as relative advantage of Cloud ERP systems, compatibility of Cloud ERP systems, and security concern of Cloud ERP system environment. Organizational factors included top management support, organizational readiness, size of the organization, centralization, and formalization. External environment factors were identified as competitive pressure and vendor support.
A survey was developed using constructs from existing studies of …
Latent Factor Transition For Dynamic Collaborative Filtering, Chengyi Zhang, Ke Wang, Hongkun Yu, Jianling Sun, Ee Peng Lim
Latent Factor Transition For Dynamic Collaborative Filtering, Chengyi Zhang, Ke Wang, Hongkun Yu, Jianling Sun, Ee Peng Lim
Research Collection School Of Computing and Information Systems
No abstract provided.
Online Multi-Modal Distance Metric Learning With Application To Image Retrieval, Pengcheng Wu, Steven C. H. Hoi, Peilin Zhao, Chunyan Miao, Zhi-Yong Liu
Online Multi-Modal Distance Metric Learning With Application To Image Retrieval, Pengcheng Wu, Steven C. H. Hoi, Peilin Zhao, Chunyan Miao, Zhi-Yong Liu
Research Collection School Of Computing and Information Systems
See https://ink.library.smu.edu.sg/sis_research/2924/. Distance metric learning (DML) is an important technique to improve similarity search in content-based image retrieval. Despite being studied extensively, most existing DML approaches typically adopt a single-modal learning framework that learns the distance metric on either a single feature type or a combined feature space where multiple types of features are simply concatenated. Such single-modal DML methods suffer from some critical limitations: (i) some type of features may significantly dominate the others in the DML task due to diverse feature representations; and (ii) learning a distance metric on the combined high-dimensional feature space can be extremely …
Recurrent Chinese Restaurant Process With A Duration-Based Discount For Event Identification From Twitter, Qiming Diao, Jing Jiang
Recurrent Chinese Restaurant Process With A Duration-Based Discount For Event Identification From Twitter, Qiming Diao, Jing Jiang
Research Collection School Of Computing and Information Systems
Due to the fast development of social media on the Web, Twitter has become one of the major platforms for people to express themselves. Because of the wide adoption of Twitter, events like breaking news and release of popular videos can easily catch people’s attention and spread rapidly on Twitter, and the number of relevant tweets approximately reflects the impact of an event. Event identification and analysis on Twitter has thus become an important task. Recently the Recurrent Chinese Restaurant Process (RCRP) has been successfully used for event identification from news streams and news-centric social media streams. However, these models …
[Sabbatical Report], Huanjing Wang
[Sabbatical Report], Huanjing Wang
Sabbatical Reports
My sabbatical leave was conducted during Spring semester 2014. The leave was successful because it strengthened my research in data mining and software engineering domains and resulted four full-paper publications in peer-reviewed international conferences and one journal paper (to be submitted to a peer-reviewed journal). The purpose of my sabbatical was to complete two main projects: (1) Investigate the stability and defect prediction model performance of feature selection techniques together on real-world software metrics data and (2) Design a novel, robust, and efficient metric selection method for imbalanced data.
Do You Know The Speaker?: An Online Experiment With Authority Messages On Event Websites, Kwan-Hui Lim, Binyan Jiang, Ee Peng Lim, Achananuparp Palakorn
Do You Know The Speaker?: An Online Experiment With Authority Messages On Event Websites, Kwan-Hui Lim, Binyan Jiang, Ee Peng Lim, Achananuparp Palakorn
Research Collection School Of Computing and Information Systems
With the widespread adoption of the Web, many companies and organizations have established websites that provide information and support online transactions (e.g., buying products or viewing content). Unfortunately, users have limited attention to spare for interacting with online sites. Hence, it is of utmost importance to design sites that attract user attention and effectively guide users to the product or content items they like. Thus, we propose a novel and scalable experimentation approach to evaluate the effectiveness of online site designs. Our case study focuses on the effects of an authority message on visitors' browsing behavior on workshop and seminar …
Assessing The Impact Of Electronic Health Record Systems Implementation On Hospital Patient Perceptions Of Care, Katherine Sofia Palacio Salgar
Assessing The Impact Of Electronic Health Record Systems Implementation On Hospital Patient Perceptions Of Care, Katherine Sofia Palacio Salgar
Engineering Management & Systems Engineering Theses & Dissertations
The delivery of health care services has been impacted by advances in Knowledge Management Information Systems (KMIS) and Information Technology (IT). The literature reveals that Electronic Health Records Systems (EHRs) are a comprehensive KMIS. There is a wide recognition in the body of knowledge that demonstrates the potential of EHRs to transform all aspects of health care services and, in consequence, the performance of Health Care Delivery Organizations (HCDO). Authors of published research also agree that there is a need for more empirical contributions that demonstrate the impact of EHRs upon HCDO. It is argued that in most cases, studies …
On Modeling Community Behaviors And Sentiments In Microblogging, Tuan Anh Hoang, William Cohen, Ee Peng Lim
On Modeling Community Behaviors And Sentiments In Microblogging, Tuan Anh Hoang, William Cohen, Ee Peng Lim
Research Collection School Of Computing and Information Systems
In this paper, we propose the CBS topic model, a probabilistic graphical model, to derive the user communities in microblogging networks based on the sentiments they express on their generated content and behaviors they adopt. As a topic model, CBS can uncover hidden topics and derive user topic distribution. In addition, our model associates topic-specific sentiments and behaviors with each user community. Notably, CBS has a general framework that accommodates multiple types of behaviors simultaneously. Our experiments on two Twitter datasets show that the CBS model can effectively mine the representative behaviors and emotional topics for each community. We also …
On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo
On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo
Research Collection School Of Computing and Information Systems
Gaming expertise is usually accumulated through playing or watching many game instances, and identifying critical moments in these game instances called turning points. Turning point rules (shorten as TPRs) are game patterns that almost always lead to some irreversible outcomes. In this paper, we formulate the notion of irreversible outcome property which can be combined with pattern mining so as to automatically extract TPRs from any given game datasets. We specifically extend the well-known PrefixSpan sequence mining algorithm by incorporating the irreversible outcome property. To show the usefulness of TPRs, we apply them to Tetris, a popular game. We mine …
Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Z. Garcia, Miriam A M Capretz, M. Beatriz F. Toledo
Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Z. Garcia, Miriam A M Capretz, M. Beatriz F. Toledo
Electrical and Computer Engineering Publications
Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. This paper focuses on the areas of service description and discovery. The problems in these areas are that currently it is not possible to describe how a service provider deals with information received from a service consumer as well as discover a service that satisfies the privacy preferences of a consumer. There is currently no framework which offers a solution that supports a rich description of privacy policies and their integration in the process of service discovery. Thus, the main goal of this paper is to propose a privacy preservation …
Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray
Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray
Faculty Articles
Many scholarly social networking sites targeting an audience of academicians and researchers have appeared on the Internet in recent years. Their vision is to change the way researchers connect, share and collaborate to solve real world problems. Despite the hype, however, their impact on higher education is unclear. Studies exist that address the benefits of these sites, but studies that investigate the implications of how scholarly social networking systems vet information, including data related to user profiles and uploaded content, is nonexistent. This paper chronicles the system management of user information for an inactive user of a scholarly social networking …
Algorithmic Accountability, Tamara Kneese
Algorithmic Accountability, Tamara Kneese
Media Studies
Accountability is fundamentally about checks and balances to power. In theory, both government and corporations are kept accountable through social, economic, and political mechanisms. Journalism and public advocates serve as an additional tool to hold powerful institutions and individuals accountable. But in a world of data and algorithms, accountability is often murky. Beyond questions about whether the market is sufficient or governmental regulation is necessary, how should algorithms be held accountable? For example what is the role of the fourth estate in holding data-oriented practices accountable?
Data Supply Chains, Tamara Kneese
Data Supply Chains, Tamara Kneese
Media Studies
As data moves between actors and organizations, what emerges is a data supply chain. Unlike manufacturing supply chains, transferred data is often duplicated in the process, challenging the essence of ownership. What does ethical data labor look like? How are the various stakeholders held accountable for being good data guardians? What does clean data transfer look like? What kinds of best practices can business and government put into place? What upstream rights to data providers have over downstream commercialization of their data?
Predicting Human Behavior, Tamara Kneese
Predicting Human Behavior, Tamara Kneese
Media Studies
Countless highly accurate predictions can be made from trace data, with varying degrees of personal or societal consequence (e.g., search engines predict hospital admission, gaming companies can predict compulsive gambling problems, government agencies predict criminal activity). Predicting human behavior can be both hugely beneficial and deeply problematic depending on the context. What kinds of predictive privacy harms are emerging? And what are the implications for systems of oversight and due process protections? For example, what are the implications for employment, health care and policing when predictive models are involved? How should varied organizations address what they can predict?
Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon
Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon
Ming Gao
Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …
R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo
R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo
Ming Gao
The robustness of a network is determined by how well its vertices are connected to one another so as to keep the network strong and sustainable. As the network evolves its robustness changes and may reveal events as well as periodic trend patterns that affect the interactions among users in the network. In this paper, we develop R-energy as a new measure of network robustness based on the spectral analysis of normalized Laplacian matrix. R-energy can cope with disconnected networks, and is efficient to compute with a time complexity of O (jV j + jEj) where V and E are …
Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash
Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash
Umakant Mishra
Although Information Systems and Information Technology (IS & IT) has become a major driving force for many of the current day organizations, the NGOs have not been able to utilize the benefits up to a satisfactory level. Most organizations use standard office tools to manage huge amount for field data and never feel the need for a central repository of data. While many people argue that an NGO should not spend too much money on information management, it is a fact that organizing the information requires more of a mindset and an organized behavior than a huge financial investment.
Time-Series Data Mining In Transportation: A Case Study On Singapore Public Train Commuter Travel Patterns, Tin Seong Kam, Roy Ka Wei Lee
Time-Series Data Mining In Transportation: A Case Study On Singapore Public Train Commuter Travel Patterns, Tin Seong Kam, Roy Ka Wei Lee
Research Collection School Of Computing and Information Systems
The adoption of smart cards technologies and automated data collection systems (ADCS) in transportation domain had provided public transport planners opportunities to amass a huge and continuously increasing amount of time-series data about the behaviors and travel patterns of commuters. However the explosive growth of temporal related databases has far outpaced the transport planners’ ability to interpret these data using conventional statistical techniques, creating an urgent need for new techniques to support the analyst in transforming the data into actionable information and knowledge. This research study thus explores and discusses the potential use of time-series data mining, a relatively new …
Online Feature Selection And Its Applications, Jialei Wang, Peilin Zhao, Steven C. H. Hoi, Rong Jin
Online Feature Selection And Its Applications, Jialei Wang, Peilin Zhao, Steven C. H. Hoi, Rong Jin
Research Collection School Of Computing and Information Systems
Feature selection is an important technique for data mining. Despite its importance, most studies of feature selection are restricted to batch learning. Unlike traditional batch learning methods, online learning represents a promising family of efficient and scalable machine learning algorithms for large-scale applications. Most existing studies of online learning require accessing all the attributes/features of training instances. Such a classical setting is not always appropriate for real-world applications when data instances are of high dimensionality or it is expensive to acquire the full set of attributes/features. To address this limitation, we investigate the problem of online feature selection (OFS) in …
Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu, Mei Tao, Jiebo Luo
Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu, Mei Tao, Jiebo Luo
Research Collection School Of Computing and Information Systems
Auto face annotation, which aims to detect human faces from a facial image and assign them proper human names, is a fundamental research problem and beneficial to many real-world applications. In this work, we address this problem by investigating a retrieval-based annotation scheme of mining massive web facial images that are freely available over the Internet. In particular, given a facial image, we first retrieve the top n similar instances from a large-scale web facial image database using content-based image retrieval techniques, and then use their labels for auto annotation. Such a scheme has two major challenges: 1) how to …
L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan
L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan
Research Collection School Of Computing and Information Systems
The wealth of information contained in online social networks has created a demand for the publication of such data as graphs. Yet, publication, even after identities have been removed, poses a privacy threat. Past research has suggested ways to publish graph data in a way that prevents the re-identification of nodes. However, even when identities are effectively hidden, an adversary may still be able to infer linkage between individuals with sufficiently high confidence. In this paper, we focus on the privacy threat arising from such link disclosure. We suggest L-opacity, a sufficiently strong privacy model that aims to control an …
Information-Theoretic Multi-View Domain Adaptation: A Theoretical And Empirical Study, Pei Yang, Wei Gao
Information-Theoretic Multi-View Domain Adaptation: A Theoretical And Empirical Study, Pei Yang, Wei Gao
Research Collection School Of Computing and Information Systems
Multi-view learning aims to improve classification performance by leveraging the consistency among different views of data. The incorporation of multiple views was paid little attention in the studies of domain adaptation, where the view consistency based on source data is largely violated in the target domain due to the distribution gap between different domain data. In this paper, we leverage multiple views for cross-domain document classification. The central idea is to strengthen the views' consistency on target data by identifying the associations of domain-specific features from different domains. We present an Information-theoretic Multi-view Adaptation Model (IMAM) using a multi-way clustering …
On Predicting User Affiliations Using Social Features In Online Social Networks, Minh Thap Nguyen
On Predicting User Affiliations Using Social Features In Online Social Networks, Minh Thap Nguyen
Dissertations and Theses Collection (Open Access)
User profiling such as user affiliation prediction in online social network is a challenging task, with many important applications in targeted marketing and personalized recommendation. The research task here is to predict some user affiliation attributes that suggest user participation in different social groups.
L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan
L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan
Sadegh Nobari
The wealth of information contained in online social networks has created a demand for the publication of such data as graphs. Yet, publication, even after identities have been removed, poses a privacy threat. Past research has suggested ways to publish graph data in a way that prevents the re-identification of nodes. However, even when identities are effectively hidden, an adversary may still be able to infer linkage between individuals with sufficiently high confidence. In this paper, we focus on the privacy threat arising from such link disclosure. We suggest L-opacity, a sufficiently strong privacy model that aims to control an …