{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:39:10Z","timestamp":1773157150401,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["16KIS0656"],"award-info":[{"award-number":["16KIS0656"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133972","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1943-1957","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["walk2friends"],"prefix":"10.1145","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[{"name":"Saarland University, Saarbruecken, Germany"}]},{"given":"Mathias","family":"Humbert","sequence":"additional","affiliation":[{"name":"ETH Zurich and EPFL, Lausanne, Switzerland"}]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbruecken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0034"},{"key":"e_1_3_2_2_2_1","volume-title":"Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles Proceedings of the 25th USENIX Security Symposium (Security). USENIX, 1223--1240","author":"Backes Michael","year":"2016","unstructured":"Michael Backes, Pascal Berrang, Anne Hecksteden, Mathias Humbert, Andreas Keller, and Tim Meyer 2016. Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles Proceedings of the 25th USENIX Security Symposium (Security). USENIX, 1223--1240."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772698"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23032"},{"key":"e_1_3_2_2_5_1","volume-title":"You Are Where You Tweet: A Content-Based Approach to Geo-locating Twitter Users Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM). ACM, 759--768","author":"Cheng Zhiyuan","unstructured":"Zhiyuan Cheng, James Caverlee, and Kyumin Lee. 2010. You Are Where You Tweet: A Content-Based Approach to Geo-locating Twitter Users Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM). ACM, 759--768."},{"key":"e_1_3_2_2_6_1","volume-title":"Sui","author":"Cheng Zhiyuan","year":"2011","unstructured":"Zhiyuan Cheng, James Caverlee, Kyumin Lee, and Daniel Z. Sui 2011. Exploring Millions of Footprints in Location Sharing Services Proceedings of the 5th International Conference on Weblogs and Social Media (ICWSM). The AAAI Press, 81--88."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1006155107"},{"key":"e_1_3_2_2_9_1","volume-title":"Facebook Users Have Become Much More Private: A Large-Scale Study Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 346--352","author":"Dey Ratan","year":"2012","unstructured":"Ratan Dey, Zubin Jelveh, and Keith Ross 2012. Facebook Users Have Become Much More Private: A Large-Scale Study Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 346--352."},{"key":"e_1_3_2_2_10_1","volume-title":"Link Prediction and Recommendation across Heterogeneous Social Networks Proceedings of the 12th International Conference on Data Mining (ICDM)","author":"Dong Yuxiao","unstructured":"Yuxiao Dong, Jie Tang, Sen Wu, Jilei Tian, Nittiest V Chawla, Jinghai Rao, and Huanhuan Cao 2012. Link Prediction and Recommendation across Heterogeneous Social Networks Proceedings of the 12th International Conference on Data Mining (ICDM). IEEE, 181--190."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507182"},{"key":"e_1_3_2_2_13_1","volume-title":"node2vec: Scalable Feature Learning for Networks Proceedings of the 22nd ACM Conference on Knowledge Discovery and Data Mining (KDD). ACM, 855--864","author":"Grover Aditya","unstructured":"Aditya Grover and Jure Leskovec 2016. node2vec: Scalable Feature Learning for Networks Proceedings of the 22nd ACM Conference on Knowledge Discovery and Data Mining (KDD). ACM, 855--864."},{"key":"e_1_3_2_2_14_1","volume-title":"Nowhere to Hide: Navigating around Privacy in Online Social Networks Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)","author":"Humbert Mathias","unstructured":"Mathias Humbert, Th\u00e9ophile Studer, Matthias Grossglauser, and Jean-Pierre Hubaux. 2013. Nowhere to Hide: Navigating around Privacy in Online Social Networks Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS). Springer, 682--699."},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media (ICWSM). The AAAI Press, 273--282","author":"Jurgens David","year":"2013","unstructured":"David Jurgens. 2013. That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships. In Proceedings of the 7th International Conference on Weblogs and Social Media (ICWSM). The AAAI Press, 273--282."},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 9th International Conference on Weblogs and Social Media (ICWSM). The AAAI Press, 188--197","author":"Jurgens David","year":"2015","unstructured":"David Jurgens, Tyler Finethy, James McCorriston, Yi Tian Xu, and Derek Ruths 2015. Geolocation Prediction in Twitter Using Social Networks: A Critical Analysis and Review of Current Practice. In Proceedings of the 9th International Conference on Weblogs and Social Media (ICWSM). The AAAI Press, 188--197."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835837"},{"key":"e_1_3_2_2_20_1","volume-title":"Demographics, Social Network Structure and User-Generated Content on Instagram. CoRR","author":"Manikonda Lydia","year":"2014","unstructured":"Lydia Manikonda, Yuheng Hu, and Subbarao Kambhampati. 2014. Analyzing User Activities, Demographics, Social Network Structure and User-Generated Content on Instagram. CoRR Vol. abs\/1410.8099 (2014)."},{"key":"e_1_3_2_2_21_1","volume-title":"Location Prediction in Social Media Based on Tie Strength Proceedings of the 22nd ACM International Conference on Information and Knowledge Management (CIKM). ACM, 459--468","author":"McGee Jeffrey","year":"2013","unstructured":"Jeffrey McGee, James Caverlee, and Zhiyuan Cheng. 2013. Location Prediction in Social Media Based on Tie Strength Proceedings of the 22nd ACM International Conference on Information and Knowledge Management (CIKM). ACM, 459--468."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23783-6_28"},{"key":"e_1_3_2_2_23_1","volume-title":"Efficient Estimation of Word Representations in Vector Space Proceedings of the 1st International Conference on Learning Representations (ICLR).","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space Proceedings of the 1st International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_24_1","volume-title":"Distributed Representations of Words and Phrases and their Compositionally Proceedings of the 27th Annual Conference on Neural Information Processing Systems (NIPS). NIPS, 3111--3119","author":"Mikolov Tomas","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeffrey Dean 2013. Distributed Representations of Words and Phrases and their Compositionally Proceedings of the 27th Annual Conference on Neural Information Processing Systems (NIPS). NIPS, 3111--3119."},{"key":"e_1_3_2_2_25_1","volume-title":"Preserving Link Privacy in Social Network Based Systems Proceedings of the 20th Network and Distributed System Security Symposium (NDSS).","author":"Mittal Prateek","year":"2013","unstructured":"Prateek Mittal, Charalampos Papamanthou, and Dawn Song 2013. Preserving Link Privacy in Social Network Based Systems Proceedings of the 20th Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2561281"},{"key":"e_1_3_2_2_29_1","volume-title":"Location Prediction: Communities Speak Louder than Friends Proceedings of the 3rd ACM on Conference on Online Social Networks (COSN). ACM, 161--171","author":"Pang Jun","unstructured":"Jun Pang and Yang Zhang 2015. Location Prediction: Communities Speak Louder than Friends Proceedings of the 3rd ACM on Conference on Online Social Networks (COSN). ACM, 161--171."},{"key":"e_1_3_2_2_30_1","volume-title":"DeepCity: A Feature Learning Framework for Mining Location Check-Ins Proceedings of the 11th International Conference on Web and Social Media (ICWSM). The AAAI Press, 652--655","author":"Pang Jun","year":"2017","unstructured":"Jun Pang and Yang Zhang 2017. DeepCity: A Feature Learning Framework for Mining Location Check-Ins Proceedings of the 11th International Conference on Web and Social Media (ICWSM). The AAAI Press, 652--655."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078729"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Huy Pham Cyrus Shahabi and Yan Liu 2013. EBM: An Entropy-Based Model to Infer Social Strength from Spatiotemporal Data Proceedings of the 2013 ACM Conference on Management of Data (SIGMOD). ACM 265--276.","DOI":"10.1145\/2463676.2465301"},{"key":"e_1_3_2_2_34_1","volume-title":"Bigham","author":"Sadilek Adam","year":"2012","unstructured":"Adam Sadilek, Henry Kautz, and Jeffrey P. Bigham. 2012. Finding Your Friends and Following Them to Where You Are Proceedings of the 5th ACM Conference on Web Search and Data Mining (WSDM). ACM, 459--468."},{"key":"e_1_3_2_2_35_1","volume-title":"Exploiting Place Features in Link Prediction on Location-based Social Networks Proceedings of the 17th ACM Conference on Knowledge Discovery and Data Mining (KDD). ACM, 1046--1054","author":"Scellato Salvatore","year":"2011","unstructured":"Salvatore Scellato, Anastasios Noulas, and Cecilia Mascolo 2011. Exploiting Place Features in Link Prediction on Location-based Social Networks Proceedings of the 17th ACM Conference on Knowledge Discovery and Data Mining (KDD). ACM, 1046--1054."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Mudhakar Srivatsa and Mike Hicks 2012. Deanonymizing Mobility Traces: Using Social Network as a Side-channel Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS). ACM 628--637.","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355749"},{"key":"e_1_3_2_2_40_1","volume-title":"Global and Temporal Factors Proceedings of the 14th IEEE Conference on Data Mining (ICDM). IEEE, 570--579","author":"Wang Hongjian","year":"2014","unstructured":"Hongjian Wang, Zhenhui Li, and Wang-Chien Lee. 2014. PGT: Measuring Mobility Relationship using Personal, Global and Temporal Factors Proceedings of the 14th IEEE Conference on Data Mining (ICDM). IEEE, 570--579."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983845"},{"key":"e_1_3_2_2_42_1","volume-title":"Distance and Friendship: A Distance-based Model for Link Prediction in Social Networks Proceedings of the 17th Asia-Pacific Web Conference (APWeb). Springer, 55--66","author":"Zhang Yang","year":"2015","unstructured":"Yang Zhang and Jun Pang 2015. Distance and Friendship: A Distance-based Model for Link Prediction in Social Networks Proceedings of the 17th Asia-Pacific Web Conference (APWeb). Springer, 55--66."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133972"}},"subtitle":["Inferring Social Links from Mobility Profiles"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":42,"alternative-id":["10.1145\/3133956.3133972","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133972","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}