Privacy-Preserving Function Computation by Exploitation of Friendships in Social Networks
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
To better understand networking and security aspects of VANETs, we have been investigating network connectivity issues and mappings of car networks to the underlying road topology. Using this mapping and various metrics based on centrality, we locate hot-s ...
Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus "sniff on", each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mo ...
Organizations exploit the information diffusion and signaling properties of their existing inter-organizational networks to manage the risks and uncertainty involved in forming new partnerships. How then do new organizations that are unknown to existing ne ...
Mobile social networks and location-aware applications are becoming more and more widespread in current wireless networks. Thanks to WiFi or Bluetooth-enabled devices, everyday mobile users can enjoy new services. However, the deployment of these mobile te ...
The large-scale organization of the world economies is exhibiting increasingly levels of local heterogeneity and global interdependency. Understanding the relation between local and global features calls for analytical tools able to uncover the global emer ...
This paper presents a stochastic model for spatially embedded social networks based on the ideas of spatial interaction models. Analysing empirical data, we find that the probability to accept a social contact at a certain distance follows a power law with ...
The explosive growth of online social networks (OSNs) and their wide popularity suggest the impact of OSNs on today's Internet. At the same time, concentration of vast amount of personal information within a single administrative domain causes critical pri ...
This paper investigates context-driven flow allocation and media delivery in online social networks. We exploit information on contacts and content preferences found in social networking applications to provide efficient network services and operation at t ...
Online social networks increasingly allow mobile users to share their location with their friends. Much to the detriment of users’ privacy, this also means that social network operators collect users’ lo- cation. Similarly, third parties can learn users’ l ...
This paper uses statistical data from the annual R&D survey of financial flows received or spent by the firm for R&D activities. To describe R&D networks, attention is focused on the construction of four synthetic proxies from empirical literature on socia ...