{"id":"https://openalex.org/W2756057702","doi":"https://doi.org/10.1109/iske.2017.8258834","title":"Social media users' privacy against malicious data miners","display_name":"Social media users' privacy against malicious data miners","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2756057702","doi":"https://doi.org/10.1109/iske.2017.8258834","mag":"2756057702"},"language":"en","primary_location":{"id":"doi:10.1109/iske.2017.8258834","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske.2017.8258834","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016246653","display_name":"Khondker Jahid Reza","orcid":"https://orcid.org/0000-0002-6562-2447"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Khondker Jahid Reza","raw_affiliation_strings":["Panorama Avenue, School of Computing and Mathematics Charles Sturt University, Bathurst, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"Panorama Avenue, School of Computing and Mathematics Charles Sturt University, Bathurst, New South Wales, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015246388","display_name":"Md Zahidul Islam","orcid":"https://orcid.org/0000-0002-4868-4945"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Md Zahidul Islam","raw_affiliation_strings":["Panorama Avenue, School of Computing and Mathematics Charles Sturt University, Bathurst, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"Panorama Avenue, School of Computing and Mathematics Charles Sturt University, Bathurst, New South Wales, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061047124","display_name":"Vladimir Estivill\u2010Castro","orcid":"https://orcid.org/0000-0001-7775-0780"},"institutions":[{"id":"https://openalex.org/I170486558","display_name":"Pompeu Fabra University","ror":"https://ror.org/04n0g0b29","country_code":"ES","type":"education","lineage":["https://openalex.org/I170486558"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Vladimir Estivill-Castro","raw_affiliation_strings":["DTIC Universitat Pompeu Fabra, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"DTIC Universitat Pompeu Fabra, Barcelona, Spain","institution_ids":["https://openalex.org/I170486558"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016246653"],"corresponding_institution_ids":["https://openalex.org/I153230381"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.66370493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8077186346054077},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.7034479975700378},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.6134694814682007},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.5989418625831604},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5012609958648682},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4854632019996643},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.46391573548316956},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.46333447098731995},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4537910521030426},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.40874892473220825},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3547213673591614},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2633441984653473},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1806921362876892}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8077186346054077},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.7034479975700378},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.6134694814682007},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.5989418625831604},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5012609958648682},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4854632019996643},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.46391573548316956},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.46333447098731995},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4537910521030426},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.40874892473220825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3547213673591614},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2633441984653473},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1806921362876892},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iske.2017.8258834","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske.2017.8258834","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/381583","is_oa":false,"landing_page_url":"http://hdl.handle.net/10072/381583","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference output"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W102510005","https://openalex.org/W2013208096","https://openalex.org/W2025982560","https://openalex.org/W2043294026","https://openalex.org/W2058376141","https://openalex.org/W2114012972","https://openalex.org/W2146097977","https://openalex.org/W2153803020","https://openalex.org/W2154454189","https://openalex.org/W2160642151","https://openalex.org/W2185336639","https://openalex.org/W2273621116","https://openalex.org/W2611772714","https://openalex.org/W2727963942","https://openalex.org/W6604214479"],"related_works":["https://openalex.org/W2295836226","https://openalex.org/W4225340788","https://openalex.org/W317272953","https://openalex.org/W2025792237","https://openalex.org/W2159325866","https://openalex.org/W2272742059","https://openalex.org/W2098937825","https://openalex.org/W3010786834","https://openalex.org/W3123738772","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Sensitive":[0],"information":[1,39,61,72,84,99,133],"of":[2,44,62,134,187,219,248,281],"an":[3,251],"Online":[4],"Social":[5],"Network":[6],"(OSN)":[7],"user":[8,19,65],"can":[9,29,54,253],"be":[10,193,212,270],"discovered":[11,171],"through":[12],"sophisticated":[13],"data":[14,27,36,114,128,140,145,175,190,203,225,240,267],"mining,":[15],"even":[16],"if":[17],"the":[18,59,70,118,135,138,143,150,155,160,166,173,184,188,197,201,207,216,220,223,238,245,266,274,279],"does":[20],"not":[21,68],"directly":[22],"reveal":[23],"such":[24],"information.":[25],"Malicious":[26],"miners":[28],"build":[30],"a":[31,35,41,63,105,112,126,233,282],"decision":[32,260],"tree/forest":[33],"from":[34,172],"set":[37,115,129,146,191,204,241],"having":[38],"about":[40],"huge":[42],"number":[43],"OSN":[45],"users":[46,80,136,221],"and":[47,205,250],"thereby":[48],"learn":[49],"general":[50,119,168,185,209],"patterns":[51],"which":[52],"they":[53],"then":[55,123,158],"use":[56,232,247,254],"to":[57,95,111,116,130,196,214,259,277],"discover":[58,117],"sensitive":[60,71,98,132],"target":[64],"who":[66],"has":[67],"revealed":[69],"directly.":[73],"An":[74],"existing":[75,292],"technique":[76],"called":[77],"3LP":[78,108,154,249,289],"suggests":[79],"shall":[81,90],"suppress":[82],"some":[83,92],"(such":[85,100],"as":[86,101],"hometown),":[87],"add":[88],"and/or":[89],"delete":[91],"friendship":[93],"links":[94],"protect":[96,131],"their":[97],"political":[102],"view).":[103],"In":[104],"previous":[106,156],"study,":[107,230],"was":[109,122,147],"applied":[110,124],"training":[113,174,189,239],"pattern.":[120],"It":[121],"on":[125],"testing":[127,139,144,202,224],"in":[137,178,200,222,228,257],"set.":[141,176,226],"Once":[142],"modified":[148],"following":[149],"suggestions":[151],"made":[152,199],"by":[153,164],"study":[157],"cross-checked":[159],"users'":[161],"privacy":[162,217,275,283],"level":[163,218,276],"using":[165],"same":[167],"pattern":[169,186,210],"previously":[170],"However,":[177],"this":[179,229],"paper,":[180],"we":[181,231],"argue":[182,264],"that":[183,265],"will":[192],"changed":[194],"due":[195],"modifications":[198],"hence,":[206],"new":[208],"should":[211,269],"used":[213],"test":[215],"Therefore,":[227],"different":[234,243],"attack":[235],"model":[236],"where":[237],"is":[242],"after":[244],"initial":[246],"attacker":[252],"any":[255],"classifiers":[256],"addition":[258],"forests.":[261],"We":[262,285],"also":[263,286],"utility":[268],"measured":[271],"along":[272],"with":[273,290],"evaluate":[278],"effectiveness":[280],"technique.":[284],"experimentally":[287],"compare":[288],"another":[291],"method.":[293]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
