{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T15:57:12Z","timestamp":1774195032542,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/infocom.2016.7524578","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T20:47:54Z","timestamp":1469738874000},"page":"1-9","source":"Crossref","is-referenced-by-count":77,"title":["De-anonymizing social networks and inferring private attributes using knowledge graphs"],"prefix":"10.1109","author":[{"given":"Jianwei","family":"Qian","sequence":"first","affiliation":[]},{"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunhong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Linlin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49116-3_24"},{"key":"ref31","first-page":"290","article-title":"A two-stage deanonymization attack against anonymized social networks","volume":"2","author":"peng","year":"2014","journal-title":"TC 63"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736720"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.54"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068825"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7416968"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41335-3_34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020599"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"ref12","first-page":"180","article-title":"Anonymizing social networks","author":"hay","year":"2007","journal-title":"Computer Science Department Faculty Publication Series"},{"key":"ref13","first-page":"6439","article-title":"Knowledge graphs","volume":"501","author":"james","year":"1992","journal-title":"Order"},{"key":"ref14","author":"ji","year":"2015","journal-title":"On your social network de-anonymizablity Quantification and large scale evaluation with seed knowledge NDSS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660278"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2309134"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368352"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567071"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539791199334"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6953127"},{"key":"ref3","author":"ahuja","year":"1988","journal-title":"Network flows Tech rep DTIC Document"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807218"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660324"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"ref8","article-title":"De-anonymizing scale-free social networks by percolation graph matching","author":"chiasserini","year":"2015","journal-title":"ArXiv"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-012-0059-7"},{"key":"ref2","year":"0","journal-title":"Stanford Large Network Dataset Collection"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623623"},{"key":"ref1","year":"0","journal-title":"Minimum cost flow algorithm"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847974"},{"key":"ref22","first-page":"529","article-title":"Random walk inference and learning in a large scale knowledge base","author":"lao","year":"2011","journal-title":"EMNLP"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"},{"key":"ref21","article-title":"An efficient reconciliation algorithm for social networks","author":"korula","year":"2013","journal-title":"ArXiv"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567099"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.4"},{"key":"ref23","article-title":"Graph-based privacy-preserving data publication","author":"li","year":"2015","journal-title":"INFOCOM"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512952"},{"key":"ref26","article-title":"Preserving link privacy in social network based systems","author":"mittal","year":"2013","journal-title":"NDSS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.61"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"}],"event":{"name":"IEEE INFOCOM 2016 - IEEE Conference on Computer Communications","location":"San Francisco, CA, USA","start":{"date-parts":[[2016,4,10]]},"end":{"date-parts":[[2016,4,14]]}},"container-title":["IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7515093\/7524326\/07524578.pdf?arnumber=7524578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T23:54:35Z","timestamp":1475193275000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7524578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/infocom.2016.7524578","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}