Privacy Wizards for Social Networking Sites Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2011/01/17 1.

Slides:



Advertisements
Similar presentations
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Advertisements

Harvesting SSL Certificate Data to Identify Web-Fraud Reporter : 鄭志欣 Advisor : Hsing-Kuo Pao 2010/10/04 1.
Report : 鄭志欣 Advisor: Hsing-Kuo Pao 1 Learning to Detect Phishing s I. Fette, N. Sadeh, and A. Tomasic. Learning to detect phishing s. In Proceedings.
Experiments on Query Expansion for Internet Yellow Page Services Using Log Mining Summarized by Dongmin Shin Presented by Dongmin Shin User Log Analysis.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
INFORMATION REVELATION AND PRIVACY IN ONLINE SOCIAL NETWORKS (THE FACEBOOK CASE) Rachid Hamcha IMM.
Marios Iliofotou (UC Riverside) Brian Gallagher (LLNL)Tina Eliassi-Rad (Rutgers University) Guowu Xi (UC Riverside)Michalis Faloutsos (UC Riverside) ACM.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
ELPUB 2006 June Bansko Bulgaria1 Automated Building of OAI Compliant Repository from Legacy Collection Kurt Maly Department of Computer.
Starter for 10 Unit 11: Facebook Transform IT SFT11_Facebook.
Decision Tree Rong Jin. Determine Milage Per Gallon.
Data Privacy UMich Kristen LeFevre, Assistant Professor CSE Current Group Members: Daniel Fabbri (Ph.D. student) Lujun Fang (Ph.D. student)
Social Networking.
CONTENT-BASED BOOK RECOMMENDING USING LEARNING FOR TEXT CATEGORIZATION TRIVIKRAM BHAT UNIVERSITY OF TEXAS AT ARLINGTON DATA MINING CSE6362 BASED ON PAPER.
The Social Web: A laboratory for studying s ocial networks, tagging and beyond Kristina Lerman USC Information Sciences Institute.
Introduction Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Introduction Facebook How does Facebook use your data? Where do you think.
Prophiler: A fast filter for the large-scale detection of malicious web pages Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2011/03/31 1.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Client-Server Assignment for Internet Distributed Systems.
Automated malware classification based on network behavior
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Web Usage Mining with Semantic Analysis Date: 2013/12/18 Author: Laura Hollink, Peter Mika, Roi Blanco Source: WWW’13 Advisor: Jia-Ling Koh Speaker: Pei-Hao.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Data mining and machine learning A brief introduction.
Date: 2012/10/18 Author: Makoto P. Kato, Tetsuya Sakai, Katsumi Tanaka Source: World Wide Web conference (WWW "12) Advisor: Jia-ling, Koh Speaker: Jiun.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Web Page Language Identification Based on URLs Reporter: 鄭志欣 Advisor: Hsing-Kuo Pao 1.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Eric Hsueh-Chan Lu 2 and Vincent S. Tseng 1 1 Institute of Computer Science and Information.
Exploring Online Social Activities for Adaptive Search Personalization CIKM’10 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
1 Efficient Search Ranking in Social Network ACM CIKM2007 Monique V. Vieira, Bruno M. Fonseca, Rodrigo Damazio, Paulo B. Golgher, Davi de Castro Reis,
Page 1 Ming Ji Department of Computer Science University of Illinois at Urbana-Champaign.
Serving Sociologists | Advancing Sociology | Promoting Sociology to Society Facebook in the Classroom.
Supporting rapid design and evaluation of pervasive application: challenges and solutions Lei Tang 1,2, Zhiwen Yu 1, Xingshe Zhou 1, Hanbo Wang 1, Christian.
Steve Allen Marc Greco Michael Dennis. 
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
NACEP Conference 2004 Capturing them in the Web: Using Web- Based Surveys to Increase Response Rates for College Freshman Debbie.
Data Reduction via Instance Selection Chapter 1. Background KDD  Nontrivial process of identifying valid, novel, potentially useful, and ultimately understandable.
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
Social Album Utilizing social network to visualize co-event albums. 郭子豪 Advisor: 陳炳宇.
Advisor : Prof. Sing Ling Lee Student : Chao Chih Wang Date :
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Post-Ranking query suggestion by diversifying search Chao Wang.
Age and Social Networking Use Angelica Craig EDTC 5103 March 2011.
Paper Title Authors names Conference and Year Presented by Your Name Date.
Anomaly Detection in GPS Data Based on Visual Analytics Kyung Min Su - Zicheng Liao, Yizhou Yu, and Baoquan Chen, Anomaly Detection in GPS Data Based on.
BOOTSTRAPPING INFORMATION EXTRACTION FROM SEMI-STRUCTURED WEB PAGES Andrew Carson and Charles Schafer.
Using decision trees to build an a framework for multivariate time- series classification 1 Present By Xiayi Kuang.
PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao.
Content I. Introduction II. Unique features III. Pros & Cons IV. Extra benefits V. Tips & Conclusion.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Ontology Engineering and Feature Construction for Predicting Friendship Links in the Live Journal Social Network Author:Vikas Bahirwani 、 Doina Caragea.
Recommendation in Scholarly Big Data
Click Through Rate Prediction for Local Search Results
Planning Business Messages
Facebook in the Classroom
Privacy & access policies in Social networks
CATEGORIZATION OF NEWS ARTICLES USING NEURAL TEXT CATEGORIZER
Ho-Chul Cho, Kyung-Joong Kim, Sung-Bae Cho
E-Commerce Theories & Practices
Source: Procedia Computer Science(2015)70:
BIS 221 MENTOR Education for Service- -bis221mentor.com.
Using Friendship Ties and Family Circles for Link Prediction
Jinhong Jung, Woojung Jin, Lee Sael, U Kang, ICDM ‘16
Privacy Protection for Social Network Services
Leverage Consensus Partition for Domain-Specific Entity Coreference
Date: 2012/11/15 Author: Jin Young Kim, Kevyn Collins-Thompson,
Presentation transcript:

Privacy Wizards for Social Networking Sites Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2011/01/17 1

Reference  Lujun Fang and Kristen LeFevre. "Privacy Wizards for Social Networking Sites." 19th International World Wide Web Conference (WWW2010,Best student paper).  Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami,"A Privacy Recommendation Wizard for Users of Social Networking Sites" 17th ACM conference on Computer and communications security (ACM CCS2010,Demo).  2

Outline  Introduction  Wizard Overview  Active Learning Wizard  Evaluation  Conclusion 3

Introduction  Social network sites have been increasingly gaining popularity.  More than 500 million members  Privacy is a huge problem for users of social networking sites.  More Personal information  A lot of Friends (Ex: FB average 130)  Facebook’s “Privacy Setting” is too detail. 4

Goal  We propose the first privacy wizard for social networking sites.  The goal of the wizard is to automatically configure a user's privacy settings with effort from the user. 5

Challenges  Low Effort, High Accuracy  Graceful Degradation  Visible Data  Incrementality 6

Idea 7 Idea: With limited information, build a model to predict user’s preferences, auto-configure settings

Wizard Overview 8

Active Learning Wizard  Classifier  Each friend as a feature vector  Question  How to extract features from friends?  How to solicit user input? 9

Extracting Features 10 AgeSexG0G0 G1G1 G2G2 G 20 G 21 G 22 G3G3 Obama Fan Pref. Label (DOB) (Alice)25F allow (Bob)18M deny (Carol)30F ? G0G0 G1G1 G2G2 G3G3 G 20 G 21 G 22

Soliciting User Input  Ask Simple and Right questions  Question :  Would you like to share your Date of Birth with ?  How to choose informative friends using an active learning approach?  Uncertainty sampling 11

12 Figure 5: Screenshot of user study application, general questions Figure 6: Screenshot of user study application,detailed questions.

13

Evaluation  Gathered raw preference data from 45 real Facebook users.  How effective is the active learning wizard, compared to alternative tools? 14

Experiments  DTree-Active  Model is a Decision tree  Uncertainty sampling  Decision Tree  Model is a Decision tree  User labels randomly selected examples  Brute-Force  Like Facebook policy-specification tool  Assign friends to lists 15

Result 16

Tradeoff 17

Conclusion  Privacy is an important emerging problem in online social networks.  This paper presented a template for the design of a privacy wizard, which removes much of the burden from individual users. 18