{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:27:19Z","timestamp":1762432039150,"version":"3.37.3"},"reference-count":101,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018yfc1604000"],"award-info":[{"award-number":["2018yfc1604000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2042017gf0035"],"award-info":[{"award-number":["2042017gf0035"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3064208","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T21:29:49Z","timestamp":1615238989000},"page":"40417-40431","source":"Crossref","is-referenced-by-count":14,"title":["Privacy Inference Attack Against Users in Online Social Networks: A Literature Review"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5241-4211","authenticated-orcid":false,"given":"Yangheran","family":"Piao","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8728-1719","authenticated-orcid":false,"given":"Kai","family":"Ye","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6079-009X","authenticated-orcid":false,"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365989"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596580"},{"key":"ref30","first-page":"54","article-title":"Interestmap: Harvesting social network profiles for recommendations","volume":"56","author":"liu","year":"2005","journal-title":"Proc Beyond Personalization-IUI"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_26"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063720"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1142\/9789814704830_0046"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.12.021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348560"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871487"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.58"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-07-2016-0276"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979614"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101345"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"538e","DOI":"10.1097\/PCC.0000000000002474","article-title":"Using social media for rapid information dissemination in a pandemic:# PedsICU and coronavirus disease 2019","volume":"21","author":"kudchadkar","year":"2020","journal-title":"Pediatric Crit Care Med"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2430819"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016EDP7049"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2797930"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831562"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020575"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2820783.2820812"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00033"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_3"},{"key":"ref54","first-page":"387","article-title":"Homophily and latent attribute inference: Inferring latent attributes of Twitter users from neighbors","author":"zamal","year":"2012","journal-title":"Proc 6th Int AAAI Conf Weblogs Social Media"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435352"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2019.00041"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2934096"},{"key":"ref4","first-page":"265","article-title":"You are what you tweet: Analyzingtwitter for public health","author":"paul","year":"2011","journal-title":"Proc 15th Int AAAI Conf Weblogs Social Media"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-019-00631-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1283-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3009864"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0059"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3154793"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2766189"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2018.8782322"},{"key":"ref46","first-page":"979","article-title":"You are who you know and how you behave: Attribute inference attacks via users&#x2019;social friends and behaviors","author":"gong","year":"2017","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946179"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-014-0300-6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3338533.3366599"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51811-4_42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052695"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0551-4"},{"key":"ref43","first-page":"1","article-title":"You are what you like! Information leakage through users&#x2019;interests","author":"chaabane","year":"2012","journal-title":"Proc 19th Annu Netw Distrib Syst Secur Symp"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269244"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55393-7_16"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/541"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133972"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2618998"},{"key":"ref77","article-title":"Detecting friendship within dynamic online interaction networks","author":"merritt","year":"2013","journal-title":"arXiv 1303 6372"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1006155107"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684113"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.2307\/41703505"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2986472"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2561281"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00280"},{"key":"ref61","first-page":"188","article-title":"Geolocation prediction in Twitter using social networks: A critical analysis and review of current practice","author":"jurgens","year":"2015","journal-title":"Proc Int Conf Web Social Media (ICWSM)"},{"key":"ref63","first-page":"1","article-title":"I know where you live: Inferring details of people&#x2019;s lives by visualizing publicly shared location data","author":"ilaria","year":"2016","journal-title":"Proc Conf Hum Factors in Comput Syst"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0064"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186095"},{"key":"ref66","first-page":"785","article-title":"Powerspy: Location tracking using mobile device power analysis","author":"michalevsky","year":"2016","journal-title":"Proc 24th USENIX Secur Symp"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2916086"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976126"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3293319"},{"key":"ref1","first-page":"29","article-title":"Privacy in multipleon-line social networks re-identification and predictability","volume":"12","author":"nettleton","year":"2019","journal-title":"Trans Data Privacy"},{"key":"ref95","first-page":"3111","article-title":"Reputation schemes for pervasive social networks with anonymity","author":"garms","year":"2017","journal-title":"Proc 15th Annu Conf Privacy Secur Trust (PST)"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3361119"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2695487"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106102"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313480"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8759-3_11"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.087"},{"key":"ref97","first-page":"66","article-title":"Pan-private streaming algorithms","author":"dwork","year":"2010","journal-title":"Proc ICS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01515-3"},{"article-title":"Research on privacy attribute inferring attack based on data miningin social network","year":"2019","author":"li","key":"ref11"},{"key":"ref12","first-page":"429","article-title":"Multifaceted privacy: Express your online persona without revealing your sensitive attribute","author":"zakhary","year":"2020","journal-title":"Proc 28th Int Conf Adv Geographic Inf Syst (SIGSPATIAL)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2817946.2817948"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484319"},{"key":"ref15","first-page":"343","article-title":"You are what you search: Attribute inference attacks through Web search queries","author":"du","year":"2018","journal-title":"Proc Int Conf Secur Intell Comput Big-Data Service (SICBS)"},{"key":"ref16","first-page":"1136","article-title":"Gender inference of Twitter users in non-English contexts","author":"ciot","year":"2013","journal-title":"Proc Conf Empirical Methods Natural Language Process"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15712-8_48"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997389"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60033-8_75"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_11"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737458"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054181"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465301"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-811889-4.00011-7"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.319"},{"key":"ref86","article-title":"Everything about you: A multimodal approach towards friendship inference in online social networks","author":"rahman","year":"2020","journal-title":"arXiv 2003 00996"},{"key":"ref87","first-page":"99","article-title":"Attribute inference by link strength modeling in online social networks with user tags","volume":"21","author":"xiao","year":"2020","journal-title":"International Journal of Technology"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2697854"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09371663.pdf?arnumber=9371663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T18:34:29Z","timestamp":1671561269000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9371663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":101,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3064208","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}