Identifying hidden social circles for advanced privacy configuration.
Anna Cinzia SquicciariniSushama KarumanchiDan LinNicole DeSistoPublished in: Comput. Secur. (2014)
Keyphrases
- privacy preserving
- social interaction
- social networks
- social media
- hough transform
- personal information
- private information
- social networking
- privacy protection
- database
- social network sites
- social behavior
- privacy concerns
- security issues
- knowledge sharing
- security concerns
- social awareness
- optimal configuration
- social network data
- private data
- privacy issues
- differential privacy
- data sets