{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:05:59Z","timestamp":1769828759455,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T00:00:00Z","timestamp":1446422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1527939"],"award-info":[{"award-number":["CNS-1527939"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,2]]},"DOI":"10.1145\/2817946.2817956","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T12:37:04Z","timestamp":1445949424000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards Graph Watermarks"],"prefix":"10.1145","author":[{"given":"Xiaohan","family":"Zhao","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Qingyun","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287384"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/43601"},{"key":"e_1_3_2_1_3_1","volume-title":"TechCrunch","author":"Arrington M.","year":"2010","unstructured":"Arrington , M. How \"dirty\" mp3 files are a back door into cloud drm . TechCrunch , April 2010 . Arrington, M. How \"dirty\" mp3 files are a back door into cloud drm. TechCrunch, April 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_3_2_1_7_1","volume-title":"WG","author":"Collberg C. S.","year":"2003","unstructured":"Collberg , C. S. , Kobourov , S. G. , Carter , E. , and Thomborson , C. D . Graph-based approaches to software watermarking . In WG ( 2003 ). Collberg, C. S., Kobourov, S. G., Carter, E., and Thomborson, C. D. Graph-based approaches to software watermarking. In WG (2003)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/800157.805047"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706098"},{"key":"e_1_3_2_1_10_1","volume-title":"SDM","author":"Hanhij\u00e4rvi S.","year":"2009","unstructured":"Hanhij\u00e4rvi , S. , Garriga , G. C. , and Puolam\u00e4ki , K . Randomization techniques for graphs . In SDM ( 2009 ). Hanhij\u00e4rvi, S., Garriga, G. C., and Puolam\u00e4ki, K. Randomization techniques for graphs. In SDM (2009)."},{"key":"e_1_3_2_1_11_1","unstructured":"Hay M. Miklau G. Jensen D. Towsley D. and Weis P. Resisting structural re-identification in anonymized social networks.  Hay M. Miklau G. Jensen D. Towsley D. and Weis P. Resisting structural re-identification in anonymized social networks."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.227"},{"key":"e_1_3_2_1_14_1","volume-title":"ISIE","author":"Lee S.-J.","year":"2001","unstructured":"Lee , S.-J. , and Jung , S . -H. A survey of watermarking techniques applied to multimedia . In ISIE ( 2001 ). Lee, S.-J., and Jung, S.-H. A survey of watermarking techniques applied to multimedia. In ISIE (2001)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367591"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_1_21_1","first-page":"539","volume-title":"Advances in neural information processing systems","author":"Leskovec J.","year":"2012","unstructured":"Leskovec , J. , and Mcauley , J. J . Learning to discover social circles in ego networks . In Advances in neural information processing systems ( 2012 ), pp. 539 -- 547 . Leskovec, J., and Mcauley, J. J. Learning to discover social circles in ego networks. In Advances in neural information processing systems (2012), pp. 539--547."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.387094"},{"key":"e_1_3_2_1_25_1","volume-title":"S. Handbook of Applied Cryptography","author":"Menezes A. J.","year":"1996","unstructured":"Menezes , A. J. , Oorschot , P. v., and Vanstone , S. Handbook of Applied Cryptography . CRC Press, Inc. , 1996 . Menezes, A. J., Oorschot, P. v., and Vanstone, S. Handbook of Applied Cryptography. CRC Press, Inc., 1996."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_28_1","volume-title":"IJCNN","author":"Narayanan A.","year":"2011","unstructured":"Narayanan , A. , and Shmatikov , V . Link prediction by de-anonymization: How we won the kaggle social network challenge . In IJCNN ( 2011 ). Narayanan, A., and Shmatikov, V. Link prediction by de-anonymization: How we won the kaggle social network challenge. In IJCNN (2011)."},{"key":"e_1_3_2_1_29_1","volume-title":"ICME","author":"Ohbuchi R.","year":"2002","unstructured":"Ohbuchi , R. , Ueda , H. , and Shuh , E . Robust watermarking of vector digital maps . In ICME ( 2002 ). Ohbuchi, R., Ueda, H., and Shuh, E. Robust watermarking of vector digital maps. In ICME (2002)."},{"key":"e_1_3_2_1_30_1","volume-title":"Shape Modeling International","author":"Ohbuchi R.","year":"2003","unstructured":"Ohbuchi , R. , Ueda , H. , and Shuh , E . Watermarking 2d vector maps in the mesh-spectral domain . In Shape Modeling International ( 2003 ). Ohbuchi, R., Ueda, H., and Shuh, E. Watermarking 2d vector maps in the mesh-spectral domain. In Shape Modeling International (2003)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/288548.288607"},{"key":"e_1_3_2_1_32_1","first-page":"351","volume-title":"The Semantic Web-ISWC","author":"Richardson M.","year":"2003","unstructured":"Richardson , M. , Agrawal , R. , and Domingos , P . Trust management for the semantic web . In The Semantic Web-ISWC 2003 . Springer , 2003, pp. 351 -- 368 . Richardson, M., Agrawal, R., and Domingos, P. Trust management for the semantic web. In The Semantic Web-ISWC 2003. Springer, 2003, pp. 351--368."},{"key":"e_1_3_2_1_34_1","volume-title":"ICIP","author":"Ruanaidh J. O.","year":"1996","unstructured":"Ruanaidh , J. O. , Dowling , W. , and Boland , F . Phase watermarking of digital images . In ICIP ( 1996 ). Ruanaidh, J. O., Dowling, W., and Boland, F. Phase watermarking of digital images. In ICIP (1996)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772778"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068825"},{"key":"e_1_3_2_1_37_1","first-page":"18","article-title":"Information authentication for a slippery new age","author":"Steve W","year":"1995","unstructured":"Steve , W . Information authentication for a slippery new age . Dr. Dobbs Journal ( 1995 ), 18 -- 26 . Steve, W. Information authentication for a slippery new age. Dr. Dobbs Journal (1995), 18--26.","journal-title":"Dr. Dobbs Journal ("},{"key":"e_1_3_2_1_38_1","volume-title":"International Scientific Conference AND International Workshop Present Day Trends of Innovations","author":"Takac L.","year":"2012","unstructured":"Takac , L. , and Zabovsky , M . Data analysis in public social networks . In International Scientific Conference AND International Workshop Present Day Trends of Innovations ( 2012 ). Takac, L., and Zabovsky, M. Data analysis in public social networks. In International Scientific Conference AND International Workshop Present Day Trends of Innovations (2012)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731876"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382616.2382620"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378567"},{"key":"e_1_3_2_1_42_1","volume-title":"ICIP","author":"Xia X.-G.","year":"1997","unstructured":"Xia , X.-G. , Boncelet , C. G. , and Arce , G. R . A multiresolution watermark for digital images . In ICIP ( 1997 ). Xia, X.-G., Boncelet, C. G., and Arce, G. R. A multiresolution watermark for digital images. In ICIP (1997)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350193"},{"key":"e_1_3_2_1_44_1","volume-title":"SDM","author":"Ying X.","year":"2008","unstructured":"Ying , X. , and Wu , X . Randomizing social networks: a spectrum preserving approach . In SDM ( 2008 ). Ying, X., and Wu, X. Randomizing social networks: a spectrum preserving approach. In SDM (2008)."},{"key":"e_1_3_2_1_45_1","volume-title":"Graph watermarks. Arxiv preprint arXiv:1506.00022","author":"Zhao X.","year":"2015","unstructured":"Zhao , X. , Liu , Q. , Zhou , L. , Zheng , H. , and Zhao , B. Y . Graph watermarks. Arxiv preprint arXiv:1506.00022 ( 2015 ). Zhao, X., Liu, Q., Zhou, L., Zheng, H., and Zhao, B. Y. Graph watermarks. Arxiv preprint arXiv:1506.00022 (2015)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_42"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"}],"event":{"name":"COSN'15: Conference on Online Social Networks","location":"Palo Alto California USA","acronym":"COSN'15","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2015 ACM on Conference on Online Social Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2817946.2817956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2817946.2817956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:25Z","timestamp":1750225405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2817946.2817956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,2]]},"references-count":46,"alternative-id":["10.1145\/2817946.2817956","10.1145\/2817946"],"URL":"https:\/\/doi.org\/10.1145\/2817946.2817956","relation":{},"subject":[],"published":{"date-parts":[[2015,11,2]]},"assertion":[{"value":"2015-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}