Acknowledgement
Grant : 차분 프라이버시 기반 비식별화 기술 개발
Supported by : 정보통신기술진흥센터
References
- Brown, J., Broderick, A. J. and Lee, N., "Word of Mouth Communication within Online Communities: Conceptualizing the Online Social Network," Journal of Interactive Marketing, Vol. 21, No. 3, pp. 2-20, 2007. https://doi.org/10.1002/dir.20082
- Korea Information Society Development Institute, "Comparison of Social Relationship Formation Mechanism between SNS and Online Community," pp. 70-72, 2012. (in Korean)
- Korea Internet & Security Agency, "2015 Survey of the Internet Usage," pp. 65-66, 2015. (in Korean)
- Daeseon Choi, Seok Hyun Kim, Jin-Man Cho, Seung-Hun Jin, "Big Data Privacy Risk Analysis," Review of KISSC, Vol. 13, No. 2, 2013. 6. (in Korean)
- Arthur, C. (2006). What is the 1% rule? In The guardian. UK: Guardian News and Media.
- Perito, D., Castelluccia, C., Kaafar, M. A., & Manils, P. "How unique and traceable are usernames?," International Symposium on Privacy Enhancing Technologies Symposium, pp. 1-17, Jul. 2011.
- Zafarani, R, Liu, H. "Connecting users across social media sites: a behavioral-modeling approach," Proc. of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 41-49, Aug. 2013.
- Malhotra, A., Totti, L., Meira Jr, W., Kumaraguru, P., Almeida, V., "Studying user footprints in different online social networks. In Advances," 2012 IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), pp. 1065-1070, Aug. 2012.
- Mu, X., Zhu, F., Lim, E. P., Xiao, J., Wang, J., Zhou, Z. H., "User Identity Linkage by Latent User Space Modelling," Proc. of the 22th ACM SIGKDD international conference on Knowledge discovery and data mining, Aug. 2016.
- Yutao Z., Jie T. Zhilin Y., Jian P,, Philip. S., "Cosnet: Connecting heterogeneous social networks with local and global consistency," Proc. of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1485-1494, Aug. 2015.
- Iofciu, T., Fankhauser, P., Abel, F., Bischoff, K. "Identifying Users Across Social Tagging Systems," Proc. of the Fifth International AAAI Conference on Weblogs and Social Media, pp. 522-525, Jul. 2011.
- Goga, O., Lei, H., Parthasarathi, S. H. K., Friedland, G., Sommer, R., Teixeira, R., "Exploiting innocuous activity for correlating users across sites," Proc. of the 22nd international conference on World Wide Web, pp. 447-458, May. 2013.
- Liu S., Wang S., Zhu F., Zhang J., Krishnan R., "Hydra: Large-scale social identity linkage via heterogeneous behavior modeling," Proc. of the 2014 ACM SIGMOD, pp. 51-62, Jun. 2014.
- Ioffe, S. Improved consistent sampling, "weighted minhash and l1 sketching," 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 246-255, Dec. 2010.
- Keogh, E., "Exact indexing of dynamic time warping," Proc. of the 28th international conference on Very Large Data Bases, pp. 406-417, Aug. 2002.
- Breiman, L, "Random forests," Machine learning, Vol. 45, No. 1, pp. 5-32. 2001. https://doi.org/10.1023/A:1010933404324
- https://en.wikipedia.org/wiki/Confusion_matrix
- Gilles Louppe, "Understanding Random Forests: From Theory To Practice," PhD thesis, University of Liege, pp. 87-98, Jul. 2014.