R. Schmid, Salesforce service cloud ? featuring activision, 2012.

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.33

D. Perito, C. Castelluccia, M. A. Kâafar, and P. Manils, How Unique and Traceable Are Usernames?, Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), 2011.
DOI : 10.1007/978-3-642-22263-4_1

URL : https://hal.archives-ouvertes.fr/hal-00747495

D. J. Crandall, L. Backstrom, D. Huttenlocher, and J. Kleinberg, Mapping the world's photos, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526812

S. Kinsella, V. Murdock, and N. O. Hare, "I'm eating a sandwich in Glasgow", Proceedings of the 3rd international workshop on Search and mining user-generated contents, SMUC '11, 2011.
DOI : 10.1145/2065023.2065039

Z. Cheng, J. Caverlee, and K. Lee, You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, 2010.
DOI : 10.1145/1871437.1871535

M. Nanavati, N. Taylor, W. Aiello, and A. Warfield, Herbert west: deanonymizer Bing Maps API, Proceedings of the 6th USENIX Conference on Hot topics in Security (HotSec), 2011.

K. S. Jones, A STATISTICAL INTERPRETATION OF TERM SPECIFICITY AND ITS APPLICATION IN RETRIEVAL, Journal of Documentation, vol.28, issue.1, pp.11-21, 1972.
DOI : 10.1108/eb026526

B. Picart, Improved Phone Posterior Estimation Through K-NN and MLP-Based Similarity, Idiap Research Institute, Tech. Rep, 2009.

S. Cha, Comprehensive survey on distance / similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, issue.4, pp.300-307, 2007.

V. Keselj, F. Peng, N. Cercone, and C. Thomas, N-gram-based author profiles for authorship attribution, Pacific Association for Computational Linguistics, 2003.

A. Stolcke, Srilm -an extensible language modeling toolkit, Proceedings of Int'l Conference on Spoken Language Processing, 2002.

M. Tranmer and M. Elliot, Binary logistic regression Cathie Marsh for Census and Survey Research, 1920.

F. J. Provost, T. Fawcett, and R. Kohavi, The case against accuracy estimation for comparing induction algorithms, Proceedings of the Fifteenth International Conference on Machine Learning (ICML), 1998.

W. W. Cohen, P. Ravikumar, and S. E. Fienberg, A comparison of string distance metrics for name-matching tasks, Proceedings of IJCAI-03 Workshop on Information Integration, 2003.

G. Friedland, G. Maier, R. Sommer, and N. Weaver, Sherlock holmes' evil twin, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, 2011.
DOI : 10.1145/2073276.2073287

D. Irani, S. Webb, K. Li, and C. Pu, Large Online Social Footprints--An Emerging Threat, 2009 International Conference on Computational Science and Engineering, 2009.
DOI : 10.1109/CSE.2009.459

M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti et al., Abusing Social Networks for Automated User Profiling, Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection (RAID), 2010.
DOI : 10.1007/978-3-642-15512-3_22

T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, Identifying users across social tagging systems, Proceedings of the 6th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011.

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A practical attack to de-anonymize social network users Anonymization of location data does not work: a large-scale measurement study, Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P), 2010. [25] H. Zang and J. Bolot Proceedings of the 17th annual International Conference on Mobile Computing and Networking (MobiCom), 2011.

B. Hecht, L. Hong, B. Suh, and E. H. Chi, Tweets from Justin Bieber's heart, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011.
DOI : 10.1145/1978942.1978976

A. Chaabane, G. Acs, and M. A. Kaafar, You are what you like! information leakage through users' interests, Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00748162

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526781

D. and G. Avello, All liaisons are dangerous when all your friends are known to us, Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (HT), 2011.

A. Narayanan, H. Paskov, N. Z. Gong, J. Bethencourt, E. Stefanov et al., On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.46

M. A. Mishari and G. Tsudik, Exploring linkability of user reviews, Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), 2012.

L. Sweeney, Weaving Technology and Policy Together to Maintain Confidentiality, The Journal of Law, Medicine & Ethics, vol.310, issue.8, pp.3-98, 1997.
DOI : 10.1056/NEJM199511233332112

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.22

M. Srivatsa and M. Hicks, Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382262

M. Bishop, J. Cummins, S. Peisert, A. Singh, B. Bhumiratana et al., Relationships and data sanitization, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010.
DOI : 10.1145/1900546.1900567

G. Friedland and R. Sommer, Cybercasing the Joint: On the Privacy Implications of Geo-Tagging, Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec), 2010.