{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:15:45Z","timestamp":1725862545299},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319428352"},{"type":"electronic","value":"9783319428369"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42836-9_30","type":"book-chapter","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T22:30:38Z","timestamp":1470177038000},"page":"331-342","source":"Crossref","is-referenced-by-count":4,"title":["An Enhanced Structure-Based De-anonymization of Online Social Networks"],"prefix":"10.1007","author":[{"given":"Hong","family":"Li","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yunhua","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"key":"30_CR1","unstructured":"Alexa: Top 500 global sites (2016). http:\/\/www.alexa.com\/topsites . Accessed 2016"},{"key":"30_CR2","unstructured":"arXiv: arxiv bibiography (2016). http:\/\/arxiv.org\/help\/api\/index . Accessed 2016"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web. pp. 181\u2013190. ACM (2007)","DOI":"10.1145\/1242572.1242598"},{"issue":"1","key":"30_CR4","doi-asserted-by":"crossref","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S Bhagat","year":"2009","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endowment 2(1), 766\u2013777 (2009)","journal-title":"Proc. VLDB Endowment"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-319-21837-3_9","volume-title":"Wireless Algorithms, Systems, and Applications","author":"D Deng","year":"2015","unstructured":"Deng, D., Du, H., Jia, X., Ye, Q.: Minimum-cost information dissemination in social networks. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 83\u201393. Springer, Heidelberg (2015)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Ding, X., Zhang, L., Wan, Z., Gu, M.: A brief survey on de-anonymization attacks in online social networks. In: 2010 International Conference on Computational Aspects of Social Networks (CASoN). pp. 611\u2013615. IEEE (2010)","DOI":"10.1109\/CASoN.2010.139"},{"issue":"4","key":"30_CR7","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Per. Ubiquit. Comput. 10(4), 255\u2013268 (2006)","journal-title":"Per. Ubiquit. Comput."},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Ji, S., Li, W., Gong, N.Z., Mittal, P., Beyah, R.A.: On your social network de-anonymizablity: quantification and large scale evaluation with seed knowledge. In: The 2015 Network and Distributed System Security (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23096"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-319-13257-0_14","volume-title":"Information Security","author":"S Ji","year":"2014","unstructured":"Ji, S., Li, W., Srivatsa, M., He, J.S., Beyah, R.: Structure based data de-anonymization of social networks and mobility traces. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 237\u2013254. Springer, Heidelberg (2014)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, 2009, pp. 173\u2013187. IEEE (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Kapadia, A., Ahn, Y.Y.: Community-enhanced de-anonymization of online social networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. pp. 537\u2013548. ACM (2014)","DOI":"10.1145\/2660267.2660324"},{"key":"30_CR12","unstructured":"ONeill, N.: Senate begins discussing privacy implications of online advertising (2008). http:\/\/tinyurl.com\/5aqqhe . Accessed 2008"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 61\u201370. ACM (2002)","DOI":"10.1145\/775047.775057"},{"key":"30_CR14","unstructured":"Rohan, T., Tunguz-Zawislak, T.J., Sheffer, S.G., Harmsen, J.: Network node ad targeting, May 2013. uS Patent 8,438,062"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. pp. 628\u2013637. ACM (2012)","DOI":"10.1145\/2382196.2382262"},{"key":"30_CR16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.016","volume":"102","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Cai, Z., Yin, G., Gao, Y., Tong, X., Wu, G.: An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 102, 157\u2013171 (2016)","journal-title":"Comput. Netw."},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: IEEE Symposium on Security and Privacy 2010 (IEEE SP). pp. 223\u2013238. IEEE (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"30_CR18","unstructured":"Zhang, L., Cai, Z., Wang, X.: Fakeit: privately releasing user context streams for personalized mobile applications. In: IEEE Transactions on Network and Service Management (2016)"},{"key":"30_CR19","first-page":"980","volume":"11","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Wang, X., Lu, J., Li, P., Cai, Z.: An efficient privacy preserving data aggregation approach for mobile sensing. Secur. Commun. Netw. J. 11, 980\u2013992 (2016)","journal-title":"Secur. Commun. Netw. J."},{"key":"30_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-3-540-78478-4_9","volume-title":"Privacy, Security, and Trust in KDD","author":"E Zheleva","year":"2008","unstructured":"Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Malin, B., Sayg\u0131n, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 153\u2013171. Springer, Heidelberg (2008)"},{"issue":"2","key":"30_CR21","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM Sigkdd Explor. Newslett. 10(2), 12\u201322 (2008)","journal-title":"ACM Sigkdd Explor. Newslett."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42836-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:48:30Z","timestamp":1498319310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42836-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319428352","9783319428369"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42836-9_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}