Salesforce service cloud ? featuring activision, 2012. ,
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.33
How Unique and Traceable Are Usernames?, Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), 2011. ,
DOI : 10.1007/978-3-642-22263-4_1
URL : https://hal.archives-ouvertes.fr/hal-00747495
Mapping the world's photos, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526812
"I'm eating a sandwich in Glasgow", Proceedings of the 3rd international workshop on Search and mining user-generated contents, SMUC '11, 2011. ,
DOI : 10.1145/2065023.2065039
You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, 2010. ,
DOI : 10.1145/1871437.1871535
Herbert west: deanonymizer Bing Maps API, Proceedings of the 6th USENIX Conference on Hot topics in Security (HotSec), 2011. ,
A STATISTICAL INTERPRETATION OF TERM SPECIFICITY AND ITS APPLICATION IN RETRIEVAL, Journal of Documentation, vol.28, issue.1, pp.11-21, 1972. ,
DOI : 10.1108/eb026526
Improved Phone Posterior Estimation Through K-NN and MLP-Based Similarity, Idiap Research Institute, Tech. Rep, 2009. ,
Comprehensive survey on distance / similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, issue.4, pp.300-307, 2007. ,
N-gram-based author profiles for authorship attribution, Pacific Association for Computational Linguistics, 2003. ,
Srilm -an extensible language modeling toolkit, Proceedings of Int'l Conference on Spoken Language Processing, 2002. ,
Binary logistic regression Cathie Marsh for Census and Survey Research, 1920. ,
The case against accuracy estimation for comparing induction algorithms, Proceedings of the Fifteenth International Conference on Machine Learning (ICML), 1998. ,
A comparison of string distance metrics for name-matching tasks, Proceedings of IJCAI-03 Workshop on Information Integration, 2003. ,
Sherlock holmes' evil twin, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, 2011. ,
DOI : 10.1145/2073276.2073287
Large Online Social Footprints--An Emerging Threat, 2009 International Conference on Computational Science and Engineering, 2009. ,
DOI : 10.1109/CSE.2009.459
Abusing Social Networks for Automated User Profiling, Proceedings of 13th International Symposium on Recent Advances in Intrusion Detection (RAID), 2010. ,
DOI : 10.1007/978-3-642-15512-3_22
Identifying users across social tagging systems, Proceedings of the 6th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011. ,
A practical attack to de-anonymize social network users Anonymization of location data does not work: a large-scale measurement study, Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P), 2010. [25] H. Zang and J. Bolot Proceedings of the 17th annual International Conference on Mobile Computing and Networking (MobiCom), 2011. ,
Tweets from Justin Bieber's heart, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011. ,
DOI : 10.1145/1978942.1978976
You are what you like! information leakage through users' interests, Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00748162
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526781
All liaisons are dangerous when all your friends are known to us, Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (HT), 2011. ,
On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.46
Exploring linkability of user reviews, Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), 2012. ,
Weaving Technology and Policy Together to Maintain Confidentiality, The Journal of Law, Medicine & Ethics, vol.310, issue.8, pp.3-98, 1997. ,
DOI : 10.1056/NEJM199511233332112
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.22
Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382262
Relationships and data sanitization, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010. ,
DOI : 10.1145/1900546.1900567
Cybercasing the Joint: On the Privacy Implications of Geo-Tagging, Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec), 2010. ,