De-anonymization

Known as: De-anonymisation, Deanonymisation, Deanonymization 
De-anonymization (also spelt as deanonymization) is a strategy in data mining in which anonymous data is cross-referenced with other sources of data… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2018
010203020022018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin… (More)
  • figure 1
  • figure 2
Is this relevant?
2014
2014
Online social network providers have become treasure troves of information for marketers and researchers. To profit from their… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
In this paper, we study the quantification, practice, and implications of structural data (e.g., social data, mobility traces) De… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2013
2013
With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2013
2013
With the large growth of Online Social Networks (OSNs), several privacy threats have been highlighted, as well as solutions to… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was… (More)
  • figure 3
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2011
2011
  • Simon Dirlik
  • 2011
In this paper we try to de-anonymize, an anonymized trace to see how real this threat of de-anonymization is. To do this first it… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates and have millions of… (More)
  • table I
  • figure 2
  • table II
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their… (More)
  • figure 1
  • figure 4
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new class of statistical de- anonymization attacks against high-dimensional micro-data, such as individual… (More)
Is this relevant?