Följ
Weiqing Li
Titel
Citeras av
Citeras av
År
{SecGraph}: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th USENIX Security Symposium (USENIX Security 15), 303-318, 2015
1272015
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1262014
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
1072015
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
702014
General graph data de-anonymization: From mobility traces to social networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-29, 2016
332016
Seed-based de-anonymizability quantification of social networks
S Ji, W Li, NZ Gong, P Mittal, R Beyah
IEEE Transactions on Information Forensics and Security 11 (7), 1398-1411, 2016
332016
De-sag: On the de-anonymization of structure-attribute graph data
S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah
IEEE Transactions on Dependable and Secure Computing 16 (4), 594-607, 2017
252017
Structural data de-anonymization: Theory and practice
S Ji, W Li, M Srivatsa, R Beyah
IEEE/ACM Transactions on Networking 24 (6), 3523-3536, 2016
252016
On the relative de-anonymizability of graph data: Quantification and evaluation
S Ji, W Li, S Yang, P Mittal, R Beyah
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
212016
Poster: Optimization based data de-anonymization, 2014
S Ji, W Li, J He, M Srivatsa, R Beyah
Poster presented at the 35th IEEE Symposium on Security and Privacy, May 18, 21, 2014
72014
Poster: optimization based data de-anonymization
S Ji, W Li, J He, M Srivatsa, R Beyah
Poster Presented at the 35th IEEE Symposium on Security and Privacy, May, 18-21, 0
1
De-anonymizing social networks and mobility traces
W Li
Georgia Institute of Technology, 2016
2016
Supplementary File of “Structural Data De-anonymization: Theory and Practice”
S Ji, W Li, M Srivatsa, R Beyah
Prateek Mittal Princeton University
S Ji, W Li, R Beyah, NZ Gong
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.......
Z Liu, H Seo, J Großschädl, H Kim, S Ji, W Li, NZ Gong, P Mittal, R Beyah, ...
Data De-anonymization: From Mobility Traces to On-line Social Networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
Poster: De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information
S Ji, W Li, M Srivatsa, JS He, R Beyah
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–17