{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:37:23Z","timestamp":1761676643367,"version":"3.37.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000622"},{"type":"electronic","value":"9783030000639"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00063-9_12","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T09:39:46Z","timestamp":1535621986000},"page":"105-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Online Testing of User Profile Resilience Against Inference Attacks in Social Networks"],"prefix":"10.1007","author":[{"given":"Younes","family":"Abid","sequence":"first","affiliation":[]},{"given":"Abdessamad","family":"Imine","sequence":"additional","affiliation":[]},{"given":"Micha\u00ebl","family":"Rusinowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-54876-0_13","volume-title":"Risks and Security of Internet and Systems","author":"Y Abid","year":"2017","unstructured":"Abid, Y., Imine, A., Napoli, A., Ra\u00efssi, C., Rusinowitch, M.: Online link disclosure strategies for social networks. In: Cuppens, F., Cuppens, N., Lanet, J.-L., Legay, A. (eds.) CRiSIS 2016. LNCS, vol. 10158, pp. 153\u2013168. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54876-0_13"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-319-64468-4_19","volume-title":"Database and Expert Systems Applications","author":"Y Abid","year":"2017","unstructured":"Abid, Y., Imine, A., Napoli, A., Ra\u00efssi, C., Rusinowitch, M.: Two-phase preference disclosure in attributed social networks. In: Benslimane, D., Damiani, E., Grosky, W.I., Hameurlain, A., Sheth, A., Wagner, R.R. (eds.) DEXA 2017. LNCS, vol. 10438, pp. 249\u2013263. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64468-4_19"},{"key":"12_CR3","unstructured":"Abid, Y., Imine, A., Rusinowitch, M.: Sensitive attribute prediction for social networks users. In: 2nd International Workshop on Data Analytics Solutions for Real-LIfe APplications, 26 March 2018, Vienna, Austria (2018)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, 20\u201324 April 2009, pp. 551\u2013560 (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chester, S., Srivastava, G.: Social network privacy for attribute disclosure attacks. In: International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011, Kaohsiung, Taiwan, 25\u201327 July 2011, pp. 445\u2013449 (2011)","DOI":"10.1109\/ASONAM.2011.105"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Conover, M., Gon\u00e7alves, B., Ratkiewicz, J., Flammini, A., Menczer, F.: Predicting the political alignment of twitter users. In: 2011 IEEE Third International Conference on PASSAT\/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9\u201311 October 2011, pp. 192\u2013199 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.34"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Garrett Brown, M.I.A.P., Howe, T., Borders, K.: Social networks and context-aware spam. In: ACM Conference on Computer Supported Collaborative, no. 10 (2008)","DOI":"10.1145\/1460563.1460628"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/3154793","volume":"21","author":"NZ Gong","year":"2018","unstructured":"Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Priv. Secur. 21(1), 3:1\u20133:30 (2018)","journal-title":"ACM Trans. Priv. Secur."},{"issue":"2","key":"12_CR9","first-page":"27:1","volume":"5","author":"NZ Gong","year":"2014","unstructured":"Gong, N.Z., et al.: Joint link prediction and attribute inference using a social-attribute network. ACM TIST 5(2), 27:1\u201327:20 (2014)","journal-title":"ACM TIST"},{"issue":"8","key":"12_CR10","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849\u20131862 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR11","unstructured":"Kayes, I., Iamnitchi, A.: A survey on privacy and security in online social networks. CoRR, abs\/1504.03342 (2015)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Kontaxis, G., Polakis, I., Ioannidis, S., Markatos, E.P.: Detecting social network profile cloning. In: Ninth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2011, Workshop Proceedings, 21\u201325 March 2011, Seattle, WA, USA, pp. 295\u2013300 (2011)","DOI":"10.1109\/PERCOMW.2011.5766886"},{"key":"12_CR13","unstructured":"Mason, W.: Politics and culture on Facebook in the 2014 midterm elections (2014)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Skiena, S.: Exact age prediction in social networks. In: Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, 18\u201322 May 2015 - Companion Volume, pp. 91\u201392 (2015)","DOI":"10.1145\/2740908.2742765"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Ryu, E., Rong, Y., Li, J., Machanavajjhala, A.: Curso: protect yourself from curse of attribute inference: a social network privacy-analyzer. In: Proceedings of the 3rd ACM SIGMOD Workshop on Databases and Social Networks, DBSocial 2013, New York, NY, USA, 23 June 2013, pp. 13\u201318 (2013)","DOI":"10.1145\/2484702.2484706"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Vidyalakshmi, B.S., Wong, R.K., Chi, C.: User attribute inference in directed social networks as a service. In: IEEE International Conference on Services Computing, SCC 2016, San Francisco, CA, USA, June 27\u2013July 2 2016, pp. 9\u201316 (2016)","DOI":"10.1109\/SCC.2016.10"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Yin, Z., Gupta, M., Weninger, T., Han, J.: A unified framework for link recommendation using random walks. In: International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2010, Odense, Denmark, 9\u201311 August 2010, pp. 152\u2013159 (2010)","DOI":"10.1109\/ASONAM.2010.27"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, W.: An information extraction attack against on-line social networks. In: 2012 International Conference on Social Informatics (SocialInformatics), Washington, D.C., USA, 14\u201316 December 2012, pp. 49\u201355 (2012)","DOI":"10.1109\/SocialInformatics.2012.35"}],"container-title":["Communications in Computer and Information Science","New Trends in Databases and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00063-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T22:26:56Z","timestamp":1661898416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00063-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000622","9783030000639"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00063-9_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}