{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T20:56:36Z","timestamp":1763931396302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139562","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Blind De-anonymization Attacks using Social Networks"],"prefix":"10.1145","author":[{"given":"Wei-Han","family":"Lee","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Changchang","family":"Liu","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China &amp; Georgia Tech, Atlanta, GA, USA"}]},{"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Lars Backstrom Cynthia Dwork and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks hidden patterns and structural steganography. In WWW.  Lars Backstrom Cynthia Dwork and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks hidden patterns and structural steganography. In WWW.","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Carla-Fabiana Chiasserini Michele Garetto and Emilio Leonardi. 2015. Impact of Clustering on the Performance of Network De-anonymization COSN.  Carla-Fabiana Chiasserini Michele Garetto and Emilio Leonardi. 2015. Impact of Clustering on the Performance of Network De-anonymization COSN.","DOI":"10.1145\/2817946.2817953"},{"key":"e_1_3_2_1_3_1","unstructured":"Thomas M. Cover and Joy A. Thomas. 2012. Elements of information theory. John Wiley & Sons.  Thomas M. Cover and Joy A. Thomas. 2012. Elements of information theory. John Wiley & Sons."},{"key":"e_1_3_2_1_4_1","unstructured":"E Garcia. 2006. Cosine similarity and term weight tutorial. Information retrieval intelligence (2006).  E Garcia. 2006. Cosine similarity and term weight tutorial. Information retrieval intelligence (2006)."},{"key":"e_1_3_2_1_5_1","unstructured":"Michael Hay Gerome Miklau David Jensen Don Towsley and Philipp Weis. 2008. Resisting structural re-identification in anonymized social networks. In VLDB.  Michael Hay Gerome Miklau David Jensen Don Towsley and Philipp Weis. 2008. Resisting structural re-identification in anonymized social networks. In VLDB."},{"key":"e_1_3_2_1_6_1","unstructured":"Michael Hay Gerome Miklau David Jensen Philipp Weis and Siddharth Srivastava. 2007. Anonymizing social networks. Computer Science Department Faculty Publication Series (2007).  Michael Hay Gerome Miklau David Jensen Philipp Weis and Siddharth Srivastava. 2007. Anonymizing social networks. Computer Science Department Faculty Publication Series (2007)."},{"key":"e_1_3_2_1_7_1","unstructured":"Shouling Ji Weiqing Li Mudhakar Srivatsa and Raheem Beyah. 2014. Structural data de-anonymization: Quantification practice and implications. In ACM CCS.  Shouling Ji Weiqing Li Mudhakar Srivatsa and Raheem Beyah. 2014. Structural data de-anonymization: Quantification practice and implications. In ACM CCS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794371"},{"key":"e_1_3_2_1_9_1","unstructured":"Wei-Han Lee Changchang Liu Shouling Ji Prateek Mittal and Ruby Le.e 2017. How to Quantify Graph De-anonymization Risks. Information Systems Security and Privacy. Springer.  Wei-Han Lee Changchang Liu Shouling Ji Prateek Mittal and Ruby Le.e 2017. How to Quantify Graph De-anonymization Risks. Information Systems Security and Privacy. Springer."},{"key":"e_1_3_2_1_10_1","unstructured":"Wei-Han Lee Changchang Liu Shouling Ji Prateek Mittal and Ruby B Lee. 2017. Quantification of De-anonymization Risks in Social Networks Information Systems Security and Privacy. IEEE.  Wei-Han Lee Changchang Liu Shouling Ji Prateek Mittal and Ruby B Lee. 2017. Quantification of De-anonymization Risks in Social Networks Information Systems Security and Privacy. IEEE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42836-9_30"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159930"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"volume":"200","journal-title":"J. Newman.","author":"Mark","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660324"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736720"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020596"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465301"},{"key":"e_1_3_2_1_21_1","unstructured":"Raimundo Real and Juan M. Vargas. 1996. The probabilistic basis of Jaccard's index of similarity. Systematic biology (1996).  Raimundo Real and Juan M. Vargas. 1996. The probabilistic basis of Jaccard's index of similarity. Systematic biology (1996)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Mudhakar Srivatsa and Mike Hicks. 2012. Deanonymizing mobility traces: Using social network as a side-channel. In ACM CCS.  Mudhakar Srivatsa and Mike Hicks. 2012. Deanonymizing mobility traces: Using social network as a side-channel. In ACM CCS.","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501657"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:01Z","timestamp":1750212841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":23,"alternative-id":["10.1145\/3139550.3139562","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139562","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}