Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
De-anonymization
Known as:
De-anonymisation
, Deanonymisation
, Deanonymization
De-anonymization (also spelt as deanonymization) is a strategy in data mining in which anonymous data is cross-referenced with other sources of data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Data anonymization
Data mining
De-identification
Identification (information)
Expand
Broader (2)
Internet privacy
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Security risk assessment in online social networking: A detailed survey
Piyali De
,
Sandip Dey
Third International Conference on Research in…
2017
Corpus ID: 33410491
Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence…
Expand
2017
2017
TwistedPair : Towards Practical Anonymity in the Bitcoin P 2 P Network
2017
Corpus ID: 53396934
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin’s networking stack. In particular, the current…
Expand
2015
2015
A Two-stage Deanonymization Attack Against Anonymized Social Networks
K. Manasa
,
K. PriyaDarshini
,
M. Tech
2015
Corpus ID: 18973417
Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches…
Expand
2013
2013
De-Anonymizing Users Across Heterogeneous Social Computing Platforms
M. Korayem
,
David J. Crandall
International Conference on Web and Social Media
2013
Corpus ID: 1691134
Many people use multiple online and social computing platforms, and choose to share varying amounts of personal information…
Expand
2012
2012
Attacking location privacy: exploring human strategies
Thore Fechner
,
C. Kray
Ubiquitous Computing
2012
Corpus ID: 18250635
The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led…
Expand
2011
2011
Content-Based De-anonymisation of Tweets
Tomotaka Okuno
,
Masatsugu Ichino
,
T. Kuboyama
,
Hiroshi Yoshiura
Seventh International Conference on Intelligent…
2011
Corpus ID: 7559490
Various types of personal information are accessible through the Web, and they can be accessed in number of ways. Linking of the…
Expand
2010
2010
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching
Shui Yu
,
Theerasak Thapngam
,
Su Wei
,
Wanlei Zhou
International Conference on Algorithms and…
2010
Corpus ID: 33857754
Anonymous web browsing is a hot topic with many potential applications for privacy reasons The current dominant strategy to…
Expand
Highly Cited
2009
Highly Cited
2009
The Fog over the Grimpen Mire: Cloud Computing and the Law
M. Mowbray
2009
Corpus ID: 162319671
© The Fog over the Grimpen Mire: Cloud Computing and the Law
2006
2006
K-Anonymization Approaches for Supporting Multiple Constraints
Yang Xiao-chun
,
Liu Xiang-Yu
,
+4 authors
Yu G. K-Anonymization
2006
Corpus ID: 62340184
K-Anonymization is an important approach to protect data privacy in data publishing scenario. Existing approaches mainly consider…
Expand
2002
2002
Offline Payments with Auditable Tracing
D. Kügler
,
Holger Vogt
Financial Cryptography
2002
Corpus ID: 5083188
Tracing is an important mechanism to prevent crimes in anonymous payment systems. However, it is also a threat to the customer's…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE