Weiqing Li
TitleCited byYear
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
762014
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
622015
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
602015
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2015
432015
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
432014
Seed-based de-anonymizability quantification of social networks
S Ji, W Li, NZ Gong, P Mittal, R Beyah
IEEE Transactions on Information Forensics and Security 11 (7), 1398-1411, 2016
192016
General graph data de-anonymization: From mobility traces to social networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
ACM Transactions on Information and System Security (TISSEC) 18 (4), 12, 2016
172016
On the relative de-anonymizability of graph data: Quantification and evaluation
S Ji, W Li, S Yang, P Mittal, R Beyah
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
122016
Structural data de-anonymization: Theory and practice
S Ji, W Li, M Srivatsa, R Beyah
IEEE/ACM Transactions on Networking 24 (6), 3523-3536, 2016
122016
Poster: Optimization based data de-anonymization, 2014
S Ji, W Li, J He, M Srivatsa, R Beyah
Poster presented at the 35th IEEE Symposium on Security and Privacy, May 18, 21, 2014
72014
De-sag: On the de-anonymization of structure-attribute graph data
S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah
IEEE Transactions on Dependable and Secure Computing, 2017
62017
Poster: optimization based data de-anonymization
S Ji, W Li, J He, M Srivatsa, R Beyah
Poster Presented at the 35th IEEE Symposium on Security and Privacy, May, 18-21, 0
1
De-anonymizing social networks and mobility traces
W Li
Georgia Institute of Technology, 2016
2016
Supplementary File of “Structural Data De-anonymization: Theory and Practice”
S Ji, W Li, M Srivatsa, R Beyah
Prateek Mittal Princeton University
S Ji, W Li, R Beyah, NZ Gong
Data De-anonymization: From Mobility Traces to On-line Social Networks
S Ji, W Li, M Srivatsa, JS He, R Beyah
Poster: De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information
S Ji, W Li, M Srivatsa, JS He, R Beyah
The system can't perform the operation now. Try again later.
Articles 1–17