{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:50Z","timestamp":1750308590560,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T00:00:00Z","timestamp":1494547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National High-Tech R&D(862)","award":["2015AA01A707"],"award-info":[{"award-number":["2015AA01A707"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,12]]},"DOI":"10.1145\/3063955.3063988","type":"proceedings-article","created":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T12:26:53Z","timestamp":1494246413000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Hybrid de-anonymization across real-world heterogeneous social networks"],"prefix":"10.1145","author":[{"given":"Huaxin","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Qingrong","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn"}]}],"member":"320","published-online":{"date-parts":[[2017,5,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Social Media Site Usage","author":"Duggan M.","year":"2014","unstructured":"M. Duggan , N. Ellison , C. Lampe , A. Lenhart and M. Madden , \" Social Media Site Usage 2014 , Pew Research Center \", 2015. http:\/\/www.pewinternet.org\/2015\/01\/09\/social-media-update-2014\/. M. Duggan, N. Ellison, C. Lampe, A. Lenhart and M. Madden, \"Social Media Site Usage 2014, Pew Research Center\", 2015. http:\/\/www.pewinternet.org\/2015\/01\/09\/social-media-update-2014\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1167742"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"W Gauvin C. Chen X. Fu B. Liu \"Classification of Commercial and Personal Profiles on MySpace\" IEEE SESOC 2011  W Gauvin C. Chen X. Fu B. Liu \"Classification of Commercial and Personal Profiles on MySpace\" IEEE SESOC 2011","DOI":"10.1109\/PERCOMW.2011.5766883"},{"key":"e_1_3_2_1_4_1","first-page":"99","article-title":"Privacy leakage of location sharing in mobile social networks: Attacks and defense","author":"Li H.","year":"2016","unstructured":"H. Li , H. Zhu , S. Du , X. Liang , and X. Shen , \" Privacy leakage of location sharing in mobile social networks: Attacks and defense \", In IEEE Transactions on Dependable and Secure Computing vol: PP, I ssue: 99 , pp: 1--1, 2016 . H. Li, H. Zhu, S. Du, X. Liang, and X. Shen, \"Privacy leakage of location sharing in mobile social networks: Attacks and defense\", In IEEE Transactions on Dependable and Secure Computing vol: PP, Issue: 99, pp: 1--1, 2016.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE","author":"Li H.","year":"2016","unstructured":"H. Li , Z. Xu , H. Zhu , D. Ma , S. Li , K. Xing , \"Demographics inference through Wi-Fi network traffic analysis,\" In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications (pp. 1--9) , IEEE , 2016 . H. Li, Z. Xu, H. Zhu, D. Ma, S. Li, K. Xing, \"Demographics inference through Wi-Fi network traffic analysis,\" In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications (pp. 1--9), IEEE, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23353"},{"key":"e_1_3_2_1_7_1","volume-title":"ICWSM'11","author":"Iofciu T.","year":"2011","unstructured":"T. Iofciu , P. Fankhauser , F. Abel , and K. Bischoff , \" Identifying Users Across Social Tagging Systems \", ICWSM'11 , 2011 . T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, \"Identifying Users Across Social Tagging Systems\", ICWSM'11, 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v3i1.13993"},{"key":"e_1_3_2_1_9_1","volume-title":"ICWSM'13","author":"Korayem M.","year":"2013","unstructured":"M. Korayem and D. Crandall , \" De-Anonymizing Users Across Heterogeneous Social Computing Platforms \", ICWSM'13 , 2013 . M. Korayem and D. Crandall, \"De-Anonymizing Users Across Heterogeneous Social Computing Platforms\", ICWSM'13, 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736720"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660324"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2015.7448638"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_14"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_1_18_1","volume-title":"On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge\",NDSS","author":"Ji S.","year":"2015","unstructured":"S. Ji , W. Li , N. Gong , P. Mittal , and R. Beyah . \" On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge\",NDSS , 2015 . S. Ji, W. Li, N. Gong, P. Mittal, and R. Beyah. \"On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge\",NDSS, 2015."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security, (pp. 303--318)","author":"Ji S.","year":"2015","unstructured":"S. Ji , W. Li , P. Mittal , X. Hu , and R. Beyah , \" SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and Deanonymization \", In USENIX Security, (pp. 303--318) , 2015 . S. Ji, W. Li, P. Mittal, X. Hu, and R. Beyah, \"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and Deanonymization\", In USENIX Security, (pp. 303--318), 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524578"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487648"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.032513.120149"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of IEEE INFOCOM, (pp. 1969--1977)","author":"Zhang R.","year":"2012","unstructured":"R. Zhang , Y. Zhang , J. Sun , G. Yan , \"Fine-grained private matching for proximity-based mobile social networking \", In Proceedings of IEEE INFOCOM, (pp. 1969--1977) , 2012 . R. Zhang, Y. Zhang, J. Sun, G. Yan, \"Fine-grained private matching for proximity-based mobile social networking\", In Proceedings of IEEE INFOCOM, (pp. 1969--1977), 2012."},{"issue":"9","key":"e_1_3_2_1_27_1","first-page":"656","article-title":"Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking","volume":"31","author":"Zhang R.","year":"2013","unstructured":"R. Zhang , Y. Zhang , J. Sun , G. Yan , \" Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking \", IEEE JSAC , vol. 31 , no. 9 , pp. 656 -- 668 , 2013 . R. Zhang, Y. Zhang, J. Sun, G. Yan, \"Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking\", IEEE JSAC, vol. 31, no. 9, pp. 656--668, 2013.","journal-title":"IEEE JSAC"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0706851105"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, (pp. 267--270)","author":"Monge A. E.","year":"1996","unstructured":"A. E. Monge , and E. Charles , \" The Field Matching Problem: Algorithms and Applications \", Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, (pp. 267--270) , 1996 . A. E. Monge, and E. Charles, \"The Field Matching Problem: Algorithms and Applications\", Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, (pp. 267--270), 1996."},{"key":"e_1_3_2_1_30_1","volume-title":"A comparison of string metrics for matching names and records.\" Kdd workshop on data cleaning and object consolidation","author":"Cohen W.","year":"2003","unstructured":"W. Cohen , P. Ravikumar and S. Fienberg , \" A comparison of string metrics for matching names and records.\" Kdd workshop on data cleaning and object consolidation , Vol. 3 , 73--78, 2003 . W. Cohen, P. Ravikumar and S. Fienberg, \"A comparison of string metrics for matching names and records.\" Kdd workshop on data cleaning and object consolidation, Vol. 3, 73--78, 2003."},{"key":"e_1_3_2_1_31_1","volume-title":"How unique and traceable are usernames?\" In PEST'11, (pp. 1--17)","author":"Perito D.","year":"2011","unstructured":"D. Perito , C. Castelluccia , M. A. Kaafar , and P. Manils . \" How unique and traceable are usernames?\" In PEST'11, (pp. 1--17) , 2011 . D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils. \"How unique and traceable are usernames?\" In PEST'11, (pp. 1--17), 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512952"}],"event":{"name":"ACM TUR-C '17: ACM Turing 50th Celebration Conference - China","acronym":"ACM TUR-C '17","location":"Shanghai China"},"container-title":["Proceedings of the ACM Turing 50th Celebration Conference - China"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3063955.3063988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3063955.3063988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:20Z","timestamp":1750273520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3063955.3063988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,12]]},"references-count":32,"alternative-id":["10.1145\/3063955.3063988","10.1145\/3063955"],"URL":"https:\/\/doi.org\/10.1145\/3063955.3063988","relation":{},"subject":[],"published":{"date-parts":[[2017,5,12]]},"assertion":[{"value":"2017-05-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}