Defending against user identity linkage attack across multiple online social networks.
Yilin ShenFengjiao WangHongxia JinPublished in: WWW (Companion Volume) (2014)
Keyphrases
- online social networks
- social networks
- user activity
- social graph
- malicious activities
- micro blogging
- social relationships
- user interface
- social context
- social media
- social networking
- user profiles
- privacy settings
- online social networking
- network structure
- user interaction
- social relations
- location based social networks
- user model
- social networking sites
- social network analysis
- ddos attacks
- online social
- viral marketing
- recommender systems