{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:11Z","timestamp":1750306571827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000081","name":"Directorate for Education and Human Resources","doi-asserted-by":"publisher","award":["1027167"],"award-info":[{"award-number":["1027167"]}],"id":[{"id":"10.13039\/100000081","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2665943.2665956","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"59-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links"],"prefix":"10.1145","author":[{"given":"Lei","family":"Jin","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Hassan","family":"Takabi","sequence":"additional","affiliation":[{"name":"University of North Texas, Pittsburgh, PA, USA"}]},{"given":"Xuelian","family":"Long","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"James","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458123"},{"volume-title":"HT '11","author":"Avello D. G.","key":"e_1_3_2_1_2_1","unstructured":"D. G. Avello . All liaisons are dangerous when all your friends are known to us . HT '11 . D. G. Avello. All liaisons are dangerous when all your friends are known to us. HT '11."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866923"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835853"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943520"},{"volume-title":"NIPS '12","author":"McAuley J. J.","key":"e_1_3_2_1_9_1","unstructured":"J. J. McAuley and J. Leskovec . Learning to Discover Social Circles in Ego Networks . NIPS '12 . J. J. McAuley and J. Leskovec. Learning to Discover Social Circles in Ego Networks. NIPS '12."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382416.2382428"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.27"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.70"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: An Introduction","author":"Newman M. E. J.","year":"2010","unstructured":"M. E. J. Newman . Networks: An Introduction . Oxford University Press , 2010 . M. E. J. Newman. Networks: An Introduction. Oxford University Press, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772879"},{"volume-title":"SNA-KDD '12","author":"Gong N. Z.","key":"e_1_3_2_1_19_1","unstructured":"N. Z. Gong , A. Talwalkar , L. Mackey , L. Huang , E.C. R. Shin , E. Stefanov , E. Shi and D. Song . Jointly Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN) . SNA-KDD '12 . N. Z. Gong, A. Talwalkar, L. Mackey, L. Huang, E.C. R. Shin, E. Stefanov, E. Shi and D. Song. Jointly Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN). SNA-KDD '12."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133609"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835855"},{"volume-title":"The Network Completion Problem: Inferring Missing Nodes and Edges in Networks. SDM '11","author":"Kim M.","key":"e_1_3_2_1_23_1","unstructured":"M. Kim and J. Leskovec . The Network Completion Problem: Inferring Missing Nodes and Edges in Networks. SDM '11 . M. Kim and J. Leskovec. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks. SDM '11."},{"volume-title":"ICDM '12","author":"Erd\u00f6s D.","key":"e_1_3_2_1_24_1","unstructured":"D. Erd\u00f6s , R. Gemulla and E. Terzi . Reconstructing Graphs from Neighborhood Data . ICDM '12 . D. Erd\u00f6s, R. Gemulla and E. Terzi. Reconstructing Graphs from Neighborhood Data. ICDM '12."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658958"},{"volume-title":"LinkProbe: Probabilistic Inference on Large-Scale Social Networks. ICDE '13","author":"Chen H.","key":"e_1_3_2_1_26_1","unstructured":"H. Chen , W. Ku , H. Wang , L. Tang , and M. Sun . LinkProbe: Probabilistic Inference on Large-Scale Social Networks. ICDE '13 . H. Chen, W. Ku, H. Wang, L. Tang, and M. Sun. LinkProbe: Probabilistic Inference on Large-Scale Social Networks. ICDE '13."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2010.11.027"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.70"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014135"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357213"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i8.3086"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0193-7"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_3_2_1_34_1","unstructured":"eXtensible Access Control Markup Language (XACML) Version 3.0 http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html.  eXtensible Access Control Markup Language (XACML) Version 3.0 http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 13th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2665943.2665956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:25Z","timestamp":1750227205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":34,"alternative-id":["10.1145\/2665943.2665956","10.1145\/2665943"],"URL":"https:\/\/doi.org\/10.1145\/2665943.2665956","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}