Login / Signup
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation.
Sjouke Mauw
Yunior Ramírez-Cruz
Rolando Trujillo-Rasua
Published in:
CoRR (2020)
Keyphrases
</>
social graphs
malicious users
social networks
small scale
online social networks
static analysis
reverse engineering
watermarking scheme
search space
graph mining
graph databases
ddos attacks
malicious nodes