Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011. ,
DOI : 10.1145/2068816.2068823
Understanding privacy settings in facebook with an audience view, Proceedings of the 1st Conference on Usability, Psychology, and Security, pp.1-8, 2008. ,
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, Privacy Enhancing Technologies, pp.36-58, 2006. ,
DOI : 10.1007/11957454_3
The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS quarterly, pp.13-28, 2006. ,
A study of privacy settings errors in an online social network, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.340-345, 2012. ,
DOI : 10.1109/PerComW.2012.6197507
Facebook and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-15, 2012. ,
DOI : 10.1145/2335356.2335369
Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1563-1572, 2010. ,
DOI : 10.1145/1753326.1753560
Saving facebook, Iowa Law Review, vol.94, pp.1137-1206, 2009. ,
Privacy and security for online social networks: challenges and opportunities, IEEE Network, vol.24, issue.4, pp.13-18, 2010. ,
DOI : 10.1109/MNET.2010.5510913
Keeping information safe from social networking apps, Proceedings of the 2012 ACM workshop on Workshop on online social networks, WOSN '12, pp.49-54, 2012. ,
DOI : 10.1145/2342549.2342561
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.6072
Ethical Aspects of Information Security and Privacy, Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp.21-36, 2007. ,
DOI : 10.1007/978-3-540-69861-6_3
Privacy in Social Networks, Synthesis Lectures on Data Mining and Knowledge Discovery, vol.3, issue.1, pp.1-85, 2012. ,
DOI : 10.2200/S00408ED1V01Y201203DMK004
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, pp.0-34, 2010. ,
Social Network Analysis: Methods and Applications, 1994. ,
DOI : 10.1017/CBO9780511815478
Link mining, ACM SIGKDD Explorations Newsletter, vol.7, issue.2, pp.3-12, 2005. ,
DOI : 10.1145/1117454.1117456
Graph structure in the Web, Computer Networks, vol.33, issue.1-6, pp.309-320, 2000. ,
DOI : 10.1016/S1389-1286(00)00083-9
Computer Networks As Social Networks, Science, vol.293, issue.5537, pp.2031-2034, 2001. ,
DOI : 10.1126/science.1065547
A comprehensive two-hybrid analysis to explore the yeast protein interactome, Proceedings of the National Academy of Sciences, vol.98, issue.8, pp.4569-4574, 2001. ,
DOI : 10.1073/pnas.061034498
Inferring networks of diffusion and influence, ACM Transactions on Knowledge Discovery from Data, vol.5, issue.4, 2012. ,
A social network caught in the Web, First Monday, vol.8, issue.6, 2003. ,
DOI : 10.5210/fm.v8i6.1057
Beyond Social Graphs, ACM Transactions on the Web, vol.6, issue.4, pp.1-1731, 2012. ,
DOI : 10.1145/2382616.2382620
Centrality in affiliation networks, Social Networks, vol.19, issue.2, pp.157-191, 1997. ,
DOI : 10.1016/S0378-8733(96)00300-0
Network Analysis in the Social Sciences, Science, vol.323, issue.5916, pp.892-895, 2009. ,
DOI : 10.1126/science.1165821
POLYPHONET, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.262-278, 2007. ,
DOI : 10.1145/1135777.1135837
Predicting tie strength in a new medium, Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, CSCW '12, pp.1047-1056, 2012. ,
DOI : 10.1145/2145204.2145360
Social network analysis: An approach and technique for the study of information exchange, Library & Information Science Research, vol.18, issue.4, pp.323-342, 1996. ,
DOI : 10.1016/S0740-8188(96)90003-1
Social networks on the Internet, World Wide Web, vol.22, issue.1, pp.31-72, 2013. ,
DOI : 10.1007/s11280-011-0155-z
The Strength of Weak Ties, American Journal of Sociology, vol.78, issue.6, pp.1360-1380, 1973. ,
DOI : 10.1086/225469
Social networks and Internet connectivity effects, Information, Communication & Society, vol.1, issue.2, pp.125-147, 2005. ,
DOI : 10.1287/orsc.10.1.83
Different Strokes from Different Folks: Community Ties and Social Support, American Journal of Sociology, vol.96, issue.3, pp.558-588, 1990. ,
DOI : 10.1086/229572
Comparing four different methods for measuring personal social networks, Social Networks, vol.12, issue.3, pp.179-215, 1990. ,
DOI : 10.1016/0378-8733(90)90005-T
Estimating the size of personal networks, Social Networks, vol.12, issue.4, pp.289-312, 1990. ,
DOI : 10.1016/0378-8733(90)90012-X
Social capital, self-esteem, and use of online social network sites: A longitudinal analysis, Journal of Applied Developmental Psychology, vol.29, issue.6, pp.434-445, 2008. ,
DOI : 10.1016/j.appdev.2008.07.002
Online social networks: A survey of a global phenomenon, Computer Networks, vol.56, issue.18, pp.3866-3878, 2012. ,
DOI : 10.1016/j.comnet.2012.08.009
Social connectivity in america: Changes in adult friendship network size from, American Behavioral Scientist, vol.53, issue.8, pp.1148-1169, 2002. ,
Social cognition on the Internet: testing constraints on social network size, Philosophical Transactions of the Royal Society B: Biological Sciences, vol.45, issue.8, pp.2192-2201, 1599. ,
DOI : 10.1371/journal.pone.0022656
Online and offline social networks: Use of social networking sites by emerging adults, Journal of Applied Developmental Psychology, vol.29, issue.6, pp.420-433, 2008. ,
DOI : 10.1016/j.appdev.2008.07.003
Who interacts on the Web?: The intersection of users??? personality and social media use, Computers in Human Behavior, vol.26, issue.2, pp.247-253, 2010. ,
DOI : 10.1016/j.chb.2009.09.003
Looking at, looking up or keeping up with people?, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.1027-1036, 2008. ,
DOI : 10.1145/1357054.1357213
Toward a new (er) sociability: uses, gratifications and social capital on facebook. Media perspectives for the 21st century, pp.212-230, 2011. ,
Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage, Computers in Human Behavior, vol.27, issue.5, pp.1658-1664, 2011. ,
DOI : 10.1016/j.chb.2011.02.004
The effect of social networking websites on positive self-views: An experimental investigation, Computers in Human Behavior, vol.28, issue.5, pp.1929-1933, 2012. ,
DOI : 10.1016/j.chb.2012.05.012
All about me: Disclosure in online social networking profiles: The case of FACEBOOK, Computers in Human Behavior, vol.26, issue.3, pp.406-418, 2010. ,
DOI : 10.1016/j.chb.2009.11.012
Online social networks: why we disclose, Journal of Information Technology, vol.2, issue.4, pp.109-125, 2010. ,
DOI : 10.1111/j.1468-2958.1976.tb00494.x
Personality and motivations associated with Facebook use, Computers in Human Behavior, vol.25, issue.2, pp.578-586, 2009. ,
DOI : 10.1016/j.chb.2008.12.024
What do people ask their social networks, and why?, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1739-1748, 2010. ,
DOI : 10.1145/1753326.1753587
Why people use social networking sites: An empirical study integrating network externalities and motivation theory, Computers in Human Behavior, vol.27, issue.3, pp.1152-1161, 2011. ,
DOI : 10.1016/j.chb.2010.12.009
Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when personal profiles are constructed?, Computers in Human Behavior, vol.28, issue.6, pp.2067-2074, 2012. ,
DOI : 10.1016/j.chb.2012.06.010
Using social network sites: The effects of playfulness , critical mass and trust in a hedonic context, Journal of Computer Information Systems, vol.49, issue.4, pp.74-83, 2009. ,
College students' social networking experiences on Facebook, Journal of Applied Developmental Psychology, vol.30, issue.3, pp.227-238, 2009. ,
DOI : 10.1016/j.appdev.2008.12.010
An empirical study of the factors affecting social network service use, Computers in Human Behavior, vol.26, issue.2, pp.254-263, 2010. ,
DOI : 10.1016/j.chb.2009.04.011
How to search a social network, Social Networks, vol.27, issue.3, pp.187-203, 2005. ,
DOI : 10.1016/j.socnet.2005.01.007
Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2007. ,
DOI : 10.1111/j.1083-6101.2007.00393.x
Understanding online social network usage from a network perspective, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.35-48, 2009. ,
DOI : 10.1145/1644893.1644899
The role of social networks in information diffusion, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.519-528, 2012. ,
DOI : 10.1145/2187836.2187907
The Benefits of Facebook ???Friends:??? Social Capital and College Students??? Use of Online Social Network Sites, Journal of Computer-Mediated Communication, vol.22, issue.3, pp.1143-1168, 2007. ,
DOI : 10.1111/j.1083-6101.2007.00367.x
User Profile Matching in Social Networks, 2010 13th International Conference on Network-Based Information Systems, pp.297-304, 2010. ,
DOI : 10.1109/NBiS.2010.35
URL : https://hal.archives-ouvertes.fr/hal-00643509
Social networks, gender, and friending: An analysis of MySpace member profiles, Journal of the American Society for Information Science and Technology, vol.9, issue.8, pp.1321-1330, 2008. ,
DOI : 10.1002/asi.20835
Interweaving Public User Profiles on the Web, Lecture Notes in Computer Science, vol.6075, pp.16-27, 2010. ,
DOI : 10.1007/978-3-642-13470-8_4
FOAF: Connecting People on the Semantic Web, Cataloging & Classification Quarterly, vol.43, issue.3-4, pp.3-4, 2007. ,
DOI : 10.1504/IJMSO.2006.008770
Bridging the gap between physical location and online social networks, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, pp.119-128, 2010. ,
DOI : 10.1145/1864349.1864380
Discovering relationship types between users using profiles and shared photos in a social network, Multimedia Tools and Applications, vol.19, issue.2, pp.141-170, 2013. ,
DOI : 10.1007/s11042-011-0853-7
URL : https://hal.archives-ouvertes.fr/hal-01091671
Scalable learning of collective behavior based on sparse social dimensions, Proceeding of the 18th ACM conference on Information and knowledge management, CIKM '09, pp.1107-1116, 2009. ,
DOI : 10.1145/1645953.1646094
Learning to discover social circles in ego networks, Advances in Neural Information Processing Systems, pp.548-556, 2012. ,
Connection strategies: Social capital implications of Facebook-enabled communication practices, New Media & Society, vol.11, issue.4, pp.873-892, 2011. ,
DOI : 10.1177/1461444810385389
The Structure and Function of Complex Networks, SIAM Review, vol.45, issue.2, pp.167-256, 2003. ,
DOI : 10.1137/S003614450342480
Complex networks: Structure and dynamics, Physics Reports, vol.424, issue.4-5, pp.4-5, 2006. ,
DOI : 10.1016/j.physrep.2005.10.009
Community detection in graphs, Physics Reports, vol.486, issue.3-5, pp.75-174, 2010. ,
DOI : 10.1016/j.physrep.2009.11.002
Influence in Terrorist Networks: From Undirected to Directed Graphs, Studies in Conflict & Terrorism, vol.24, issue.3, pp.703-718, 2006. ,
DOI : 10.1080/10576100600701982
The efficiency/security trade-off in criminal networks, Social Networks, vol.29, issue.1, pp.143-153, 2007. ,
DOI : 10.1016/j.socnet.2006.05.001
Classifying Trust/Distrust Relationships in Online Social Networks, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.552-557 ,
DOI : 10.1109/SocialCom-PASSAT.2012.115
Dynamic Estimation of Family Relations from Photos, Lecture Notes in Computer Science, vol.1, pp.65-76, 2011. ,
DOI : 10.2197/ipsjtcva.1.115
Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009. ,
DOI : 10.1145/1609956.1609962
Modeling relationship strength in online social networks, Proceedings of the 19th international conference on World wide web, WWW '10, pp.981-990, 2010. ,
DOI : 10.1145/1772690.1772790
Friends only, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1553-1562, 2010. ,
DOI : 10.1145/1753326.1753559
Estimating the reliability and validity of personal support measures: full information ML estimation with planned incomplete data, Social Networks, vol.24, issue.1, pp.1-20, 2002. ,
DOI : 10.1016/S0378-8733(01)00047-8
Survey errors and survey costs, 2004. ,
DOI : 10.1002/0471725277
Opening the black box of link formation: Social factors underlying the structure of the web, Social Networks, vol.31, issue.4, pp.271-280, 2009. ,
DOI : 10.1016/j.socnet.2009.07.003
E-Mail as Spectroscopy: Automated Discovery of Community Structure within Organizations, The Information Society, vol.64, issue.2, pp.133-141, 2005. ,
DOI : 10.1073/pnas.0307740100
Referral Web: combining social networks and collaborative filtering, Communications of the ACM, vol.40, issue.3, pp.63-65, 1997. ,
DOI : 10.1145/245108.245123
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.838
Flink: Semantic Web technology for the extraction and analysis of social networks, Web Semantics: Science, Services and Agents on the World Wide Web, vol.3, issue.2-3, pp.211-223, 2005. ,
DOI : 10.1016/j.websem.2005.05.006
Social Network Analysis: An Introduction, Handbook of Social Network Analysis, vol.22, pp.11-25, 2010. ,
DOI : 10.4135/9781446294413.n2
What is Twitter, a social network or a news media?, Proceedings of the 19th international conference on World wide web, WWW '10, pp.591-600, 2010. ,
DOI : 10.1145/1772690.1772751
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.6476
Multidimensional social network in the social recommender system. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, vol.41, issue.4, pp.746-759, 2011. ,
Extraction and Analysis of Facebook Friendship Relations, Computational Social Networks, pp.291-324, 2012. ,
DOI : 10.1007/978-1-4471-4054-2_12
A Taxonomy of Social Networking Data, IEEE Security & Privacy Magazine, vol.8, issue.4, p.88, 2010. ,
DOI : 10.1109/MSP.2010.118
Communication Networks from the Enron Email Corpus ???It's Always About the People. Enron is no Different???, Computational and Mathematical Organization Theory, vol.64, issue.3, pp.201-228, 2005. ,
DOI : 10.1007/s10588-005-5377-0
Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.93-106, 2008. ,
DOI : 10.1145/1376616.1376629
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
URL : http://arxiv.org/abs/0903.3276
Resisting structural re-identification in anonymized social networks, The VLDB Journal, vol.2, issue.1, pp.797-823, 2010. ,
DOI : 10.1007/s00778-010-0210-x
Privacy-preserving data mining, SIGMOD Record (ACM Special Interest Group on Management of Data), vol.29, issue.2, pp.439-450, 2000. ,
State-of-the-art in privacy preserving data mining, ACM SIGMOD Record, vol.33, issue.1, pp.50-57, 2004. ,
DOI : 10.1145/974121.974131
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems, vol.2, issue.1, pp.47-77, 2011. ,
DOI : 10.1007/s10115-010-0311-2
Relationship Privacy Preservation in Publishing Online Social Networks, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, pp.443-450 ,
DOI : 10.1109/PASSAT/SocialCom.2011.191
Relationship-based access control policies and their policy languages, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.51-60, 2011. ,
DOI : 10.1145/1998441.1998450
Policy-by-example for online social networks, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.23-32, 2012. ,
DOI : 10.1145/2295136.2295142
Sharing location in online social networks, IEEE Network, vol.24, issue.5, pp.20-25, 2010. ,
DOI : 10.1109/MNET.2010.5578914
Find me if you can, Proceedings of the 19th international conference on World wide web, WWW '10, pp.61-70, 2010. ,
DOI : 10.1145/1772690.1772698
Privacy Issues for Online Personal Photograph Collections, Journal of theoretical and applied electronic commerce research, vol.5, issue.2, pp.26-40, 2010. ,
DOI : 10.4067/S0718-18762010000200003
Attribute-Based Access Control with Hidden Policies and Hidden Credentials, IEEE Transactions on Computers, vol.55, issue.10, pp.1259-1270, 2006. ,
DOI : 10.1109/TC.2006.158
Enforcing role based access control model with multimedia signatures, Journal of Systems Architecture, vol.55, issue.4, pp.264-274, 2009. ,
DOI : 10.1016/j.sysarc.2008.10.003
URL : https://hal.archives-ouvertes.fr/hal-01094095
Dynamic Purpose-Based Access Control, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.695-700, 2008. ,
DOI : 10.1109/ISPA.2008.80
Research on online social networks, ACM SIGMETRICS Performance Evaluation Review, vol.37, issue.3, pp.49-54, 2010. ,
DOI : 10.1145/1710115.1710125
The School Child???s Choice of Companions, The Journal of Educational Research, vol.14, issue.2, pp.126-132, 1926. ,
DOI : 10.1080/00220671.1926.10879675
Observation of play activities in a nursery school, Genetic Psychology Monographs, vol.4, issue.1, pp.44-88, 1928. ,
Who shall survive?, 1934. ,
Network Analysis: Some Basic Principles, Sociological Theory, vol.1, issue.1, pp.155-200, 1983. ,
DOI : 10.2307/202050
Class and Committees in a Norwegian Island Parish, Human Relations, vol.7, issue.1, pp.39-58, 1954. ,
DOI : 10.1177/001872675400700102
Network Analysis in Public Health: History, Methods, and Applications, Annual Review of Public Health, vol.28, issue.1, pp.69-93, 2007. ,
DOI : 10.1146/annurev.publhealth.28.021406.144132
The ???New??? Science of Networks, Annual Review of Sociology, vol.30, issue.1, pp.243-270, 2004. ,
DOI : 10.1146/annurev.soc.30.020404.104342
Scale-Free Networks, Scientific American, vol.288, issue.5, pp.60-69, 2003. ,
DOI : 10.1038/scientificamerican0503-60
Infection in Social Networks: Using Network Analysis to Identify High-Risk Individuals, American Journal of Epidemiology, vol.162, issue.10, pp.1024-1031, 2005. ,
DOI : 10.1093/aje/kwi308
Measurement and analysis of online social networks, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.29-42, 2007. ,
DOI : 10.1145/1298306.1298311
Centrality Indices, Network Analysis . Lecture Notes in Computer Science, vol.3418, pp.16-61, 2005. ,
DOI : 10.1007/978-3-540-31955-9_3
Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239, 1978. ,
DOI : 10.1016/0378-8733(78)90021-7
Preserving privacy in social networks: A structure-aware approach. In: Web Intelligence and Intelligent Agent Technologies, pp.647-654, 2009. ,
Data and Structural k-Anonymity in Social Networks, Privacy, Security, and Trust in KDD, pp.33-54, 2009. ,
DOI : 10.1136/sti.2006.023598
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web. WWW '07, pp.181-190, 2007. ,
Anonymizing social networks, 2007. ,
Link privacy in social networks, Proceedings of the 17th ACM conference on Information and knowledge management . CIKM '08, pp.289-298, 2008. ,
Preserving the Privacy of Sensitive Relationships in Graph Data, Privacy, Security, and Trust in KDD, pp.153-171, 2008. ,
DOI : 10.1007/978-3-540-78478-4_9
Top 10 algorithms in data mining, Knowledge and Information Systems, vol.9, issue.2, pp.1-37, 2008. ,
DOI : 10.1007/s10115-007-0114-2
Co-authorship networks in the digital library research community, Information Processing & Management, vol.41, issue.6, pp.1462-1480, 2005. ,
DOI : 10.1016/j.ipm.2005.03.012
A link mining algorithm for earnings forecast and trading, Data Mining and Knowledge Discovery, vol.51, issue.3, pp.419-445, 2009. ,
DOI : 10.1007/s10618-008-0124-z
Using Link-Based Content Analysis to Measure Document Similarity Effectively, Advances in Data and Web Management, pp.455-467, 2009. ,
DOI : 10.1016/0306-4573(88)90021-0
Recommendations on Social Network Sites: From Link Mining Perspective, 2009 International Conference on Management and Service Science, pp.1-4, 2009. ,
DOI : 10.1109/ICMSS.2009.5302750
Generating Social Network Features for Link-Based Classification, Knowledge Discovery in Databases: PKDD 2007 of Lecture Notes in Computer Science, pp.127-139, 2007. ,
DOI : 10.1007/978-3-540-74976-9_15
Enhanced hypertext categorization using hyperlinks, ACM SIGMOD Record, vol.27, issue.2, pp.307-318, 1998. ,
DOI : 10.1145/276305.276332
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.5728
Discovering molecular pathways from protein interaction and gene expression data, Bioinformatics, vol.19, issue.Suppl 1, pp.264-272, 2003. ,
DOI : 10.1093/bioinformatics/btg1037
Social network analysis in epidemiology: Current trends and perspectives, 2011 FIFTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, pp.1-11, 2011. ,
DOI : 10.1109/RCIS.2011.6006866
URL : https://hal.archives-ouvertes.fr/hal-00624364
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery, 2009 International Conference on Computational Science and Engineering, pp.582-587, 2009. ,
DOI : 10.1109/CSE.2009.435
Data Mining in Social Media, pp.327-352, 2011. ,
DOI : 10.1007/978-1-4419-8462-3_12
Iterative record linkage for cleaning and integration, Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery , DMKD '04, pp.11-18, 2004. ,
DOI : 10.1145/1008694.1008697
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.7894
Exploiting semantic role labeling, WordNet and Wikipedia for coreference resolution, Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics -, pp.192-199, 2006. ,
DOI : 10.3115/1220835.1220860
URL : http://acl.ldc.upenn.edu/N/N06/N06-1025.pdf
Integrating biological databases, Nature Reviews Genetics, vol.4, issue.5, pp.337-345, 2003. ,
DOI : 10.1038/nrg1065
Link prediction in relational data, Advances in Neural Information Processing Systems (NIPS), 2003. ,
Link prediction approach to collaborative filtering, Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries , JCDL '05, pp.141-142, 2005. ,
DOI : 10.1145/1065385.1065415
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.5175
Predicting interactions in protein networks by completing defective cliques, Bioinformatics, vol.22, issue.7, pp.823-829, 2006. ,
DOI : 10.1093/bioinformatics/btl014
Using Friendship Ties and Family Circles for Link Prediction, Lecture Notes in Computer Science, pp.5498-97, 2009. ,
DOI : 10.1007/978-3-642-14929-0_6
Discovering Links among Social Networks, Machine Learning and Knowledge Discovery in Databases, pp.467-482, 2012. ,
DOI : 10.1007/978-3-642-33486-3_30
Link mining, ACM SIGKDD Explorations Newsletter, vol.5, issue.1, pp.84-89, 2003. ,
DOI : 10.1145/959242.959253
Identifying bug signatures using discriminative graph mining, Proceedings of the eighteenth international symposium on Software testing and analysis, ISSTA '09, pp.141-152, 2009. ,
DOI : 10.1145/1572272.1572290
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.506.9662
A review on models and algorithms for motif discovery in protein-protein interaction networks, Briefings in Functional Genomics and Proteomics, vol.7, issue.2, 2008. ,
DOI : 10.1093/bfgp/eln015
Protein function prediction via graph kernels, Bioinformatics, vol.21, issue.Suppl 1, pp.47-56, 2005. ,
DOI : 10.1093/bioinformatics/bti1007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.528.6168
Leveraging relationships in social networks for sentiment analysis, Proceedings of the 18th Brazilian symposium on Multimedia and the web, WebMedia '12, pp.181-188, 2012. ,
DOI : 10.1145/2382636.2382676
Probabilistic models for discovering e-communities, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.173-182, 2006. ,
DOI : 10.1145/1135777.1135807
Kernels for Link Prediction with Latent Feature Models, Machine Learning and Knowledge Discovery in Databases, pp.517-532, 2011. ,
DOI : 10.1007/978-3-540-45167-9_12
A brief survey on anonymization techniques for privacy preserving publishing of social network data, ACM SIGKDD Explorations Newsletter, vol.10, issue.2, pp.12-22, 2008. ,
DOI : 10.1145/1540276.1540279
Everyone's an influencer, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.65-74, 2011. ,
DOI : 10.1145/1935826.1935845
Scalable influence maximization for prevalent viral marketing in large-scale social networks, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pp.1029-1038, 2010. ,
DOI : 10.1145/1835804.1835934
Maximizing the spread of influence through a social network, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '03, pp.137-146, 2003. ,
DOI : 10.1145/956750.956769
Actions speak as loud as words, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.689-698, 2012. ,
DOI : 10.1145/2187836.2187930
Birds of a Feather: Homophily in Social Networks, Annual Review of Sociology, vol.27, issue.1, pp.415-444, 2001. ,
DOI : 10.1146/annurev.soc.27.1.415
Classification in networked data: A toolkit and a univariate case study, Journal of Machine Learning Research, vol.8, pp.935-983, 2007. ,
You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pp.251-260, 2010. ,
DOI : 10.1145/1718487.1718519
Preventing private information inference attacks on social networks. Knowledge and Data Engineering, IEEE Transactions on PP, issue.1, p.99, 2012. ,
Group Recommendation System for Facebook, On the Move to Meaningful Internet Systems: OTM 2008 Workshops, pp.211-219, 2008. ,
DOI : 10.1073/pnas.0503018102
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009. ,
DOI : 10.1145/1526709.1526781
You Are What You Like! Information Leakage Through Users' Interests, Proc. Annual Network and Distributed System Security Symposium (NDSS), 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00748162
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.824
Personalized social recommendations, Proc. VLDB Endow, pp.440-450, 2011. ,
DOI : 10.14778/1988776.1988780
On link privacy in randomizing social networks, Knowledge and Information Systems, vol.19, issue.2, pp.645-663, 2011. ,
DOI : 10.1007/s10115-010-0353-5
Social network classification incorporating link type values, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.19-24, 2009. ,
DOI : 10.1109/ISI.2009.5137265
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.3360
Public Displays of Connection, BT Technology Journal, vol.22, issue.4, pp.71-82, 2004. ,
DOI : 10.1023/B:BTTJ.0000047585.06264.cc
All liaisons are dangerous when all your friends are known to us, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, HT '11, pp.171-180, 2011. ,
DOI : 10.1145/1995966.1995991
Stochastic link and group detection, Proceedings of the National Conference on Artificial Intelligence, pp.798-804, 2002. ,
Co-evolution of social and affiliation networks, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1007-1016, 2009. ,
DOI : 10.1145/1557019.1557128
Supervised random walks, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.635-644, 2011. ,
DOI : 10.1145/1935826.1935914
Multiple relationship types in online communities and social networks, Proceedings of the AAAI Symposium on Social Information Processing, AAAI, pp.30-35, 2008. ,
Exploring the facebook experience, Proceedings of the 5th Nordic conference on Human-computer interaction building bridges, NordiCHI '08, pp.471-474, 2008. ,
DOI : 10.1145/1463160.1463222
Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008. ,
DOI : 10.1145/1397735.1397744
Social Network Sites, Advances in Computers, vol.76, pp.19-73, 2009. ,
DOI : 10.1201/9781420090437-c12
The complex problem of monetizing virtual electronic social networks, Decision Support Systems, vol.48, issue.1, pp.46-56, 2009. ,
DOI : 10.1016/j.dss.2009.05.003
Disclosing false identity through hybrid link analysis, Artificial Intelligence and Law, vol.8, issue.6, pp.77-102, 2010. ,
DOI : 10.1007/s10506-010-9085-9
A conditional purpose-based access control model with dynamic roles, Expert Systems with Applications, vol.38, issue.3, pp.1482-1489, 2011. ,
DOI : 10.1016/j.eswa.2010.07.057
The privacy implications of digital preservation: Social media archives and the social networks theory of privacy, Elon Law Review, vol.3, p.133, 2011. ,
Defining and classifying ecosystem services for decision making, Ecological Economics, vol.68, issue.3, pp.643-653, 2009. ,
DOI : 10.1016/j.ecolecon.2008.09.014