{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:05Z","timestamp":1750306085448,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,7,9]],"date-time":"2017-07-09T00:00:00Z","timestamp":1499558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Council KU Leuven","award":["C16\/15\/058 and OT\/13\/070"],"award-info":[{"award-number":["C16\/15\/058 and OT\/13\/070"]}]},{"name":"Flemish Government through FWO","award":["G.0360.11N"],"award-info":[{"award-number":["G.0360.11N"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"crossref","award":["H2020-DS-2014-653497 PANORAMIX and H2020-ICT-2014-644371 WITDOM"],"award-info":[{"award-number":["H2020-DS-2014-653497 PANORAMIX and H2020-ICT-2014-644371 WITDOM"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Spanish Government","award":["TIN2014-55243-P and grant FPU-AP2010-0078"],"award-info":[{"award-number":["TIN2014-55243-P and grant FPU-AP2010-0078"]}]},{"name":"Location Privacy and FWO","award":["G.068611N"],"award-info":[{"award-number":["G.068611N"]}]},{"name":"Catalan Government","award":["AGAUR 2014SGR-691"],"award-info":[{"award-number":["AGAUR 2014SGR-691"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>\n            The separation between the public and private spheres on online social networks is known to be, at best, blurred. On the one hand, previous studies have shown how it is possible to\n            <jats:italic>infer<\/jats:italic>\n            private attributes from publicly available data. On the other hand, no distinction exists between public and private data when we consider the ability of the online social network (OSN) provider to access them. Even when OSN users go to great lengths to protect their privacy, such as by using encryption or communication obfuscation, correlations between data may render these solutions useless. In this article, we study the relationship between private communication patterns and publicly available OSN data. Such a relationship informs both privacy-invasive inferences as well as OSN communication modelling, the latter being key toward developing effective obfuscation tools. We propose an inference model based on Bayesian analysis and evaluate, using a real social network dataset, how archetypal social graph features can lead to inferences about private communication. Our results indicate that both friendship graph and public traffic data may not be informative enough to enable these inferences, with time analysis having a non-negligible impact on their precision.\n          <\/jats:p>","DOI":"10.1145\/3093897","type":"journal-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T12:16:44Z","timestamp":1499689004000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Inferring Communication Patterns in Online Social Networks"],"prefix":"10.1145","volume":"17","author":[{"given":"Ero","family":"Balsa","sequence":"first","affiliation":[{"name":"KU Leuven ESAT\/COSIC 8 iMinds, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7534-1326","authenticated-orcid":false,"given":"Cristina","family":"P\u00e9rez-Sol\u00e0","sequence":"additional","affiliation":[{"name":"dEIC Universitat Aut\u00f2noma de Barcelona, Catalonia 8 KU Leuven ESAT\/COSIC, Leuven, Belgium, Barcelona, Spain"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"KU Leuven ESAT\/COSIC 8 iMinds, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,7,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242685"},{"volume-title":"Zaki","year":"2011","author":"Hasan Mohammad Al","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150412"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488512400284"},{"volume-title":"Emergence of scaling in random networks. Science 286, 5439","year":"1999","author":"Barab\u00e1si Albert-L\u00e1szl\u00f3","key":"e_1_2_1_5_1"},{"volume-title":"PETS (Lecture Notes in Computer Science), Simone Fischer-H\u00fcbner and Nicholas Hopper (Eds.)","author":"Beato Filipe","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.009"},{"volume-title":"Proceedings of the 19th Annual Network 8 Distributed System Security Symposium (NDSS\u201912)","year":"2012","author":"Chaabane Abdelberi","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452528"},{"volume-title":"Topological features of online social networks. CoRR abs\/1202.0331","year":"2012","author":"Ferrara Emilio","key":"e_1_2_1_12_1"},{"volume-title":"Huberman","year":"2006","author":"Golder Scott A.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5578915"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.120"},{"volume-title":"Social networks that matter: Twitter under the microscope. arXiv:0812.1045","year":"2008","author":"Huberman Bernardo A.","key":"e_1_2_1_18_1"},{"volume-title":"Mistree","year":"2009","author":"Jernigan Carter","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879190"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.026209"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1309933111"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"G. Kossinets and D. Watts. 2006. Empirical analysis of an evolving social network. Science 311 5757 (2006) 88--90.  G. Kossinets and D. Watts. 2006. Empirical analysis of an evolving social network. Science 311 5757 (2006) 88--90.","DOI":"10.1126\/science.1116869"},{"volume-title":"Link Mining: Models, Algorithms, and Applications","author":"Kumar Ravi","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"e_1_2_1_27_1","unstructured":"P. Marks. 2006. Pentagon sets its sights on social networking websites. New Scientist.com Retrieved from http:\/\/www.newscientist.com\/article\/mg19025556.200?DCMP&equals;NLC.  P. Marks. 2006. Pentagon sets its sights on social networking websites. New Scientist.com Retrieved from http:\/\/www.newscientist.com\/article\/mg19025556.200?DCMP&equals;NLC."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397742"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.012582999"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772778"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"volume-title":"Strogatz","year":"1998","author":"Watts Duncan J.","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093897","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:16Z","timestamp":1750217416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,9]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/3093897"],"URL":"https:\/\/doi.org\/10.1145\/3093897","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2017,7,9]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-07-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}