A. Acquisti, R. Gross, and F. Stutzman, Faces of facebook: Privacy in the age of augmented reality, BlackHat, 2011.

Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, Analysis of topological characteristics of huge online social networking services, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.835-844, 2007.
DOI : 10.1145/1242572.1242685

M. Luca, G. Aiello, and . Ruffo, Lotusnet: Tunable privacy for distributed online social network services, Computer Communications, vol.35, issue.1, pp.75-88, 2012.

M. Valerio-arnaboldi, A. Conti, R. Passarella, and . Dunbar, Dynamics of personal social relationships in online social networks, Proceedings of the first ACM conference on Online social networks, COSN '13, pp.15-26, 2013.
DOI : 10.1145/2512938.2512949

L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna, Four degrees of separation, Proceedings of the 3rd Annual ACM Web Science Conference on, WebSci '12, pp.33-42
DOI : 10.1145/2380718.2380723

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th International Conference on World Wide Web, WWW '07, pp.181-190, 2007.

L. Backstrom, E. Sun, and C. Marlow, Find me if you can, Proceedings of the 19th international conference on World wide web, WWW '10, pp.61-70, 2010.
DOI : 10.1145/1772690.1772698

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: An online social network with user-defined privacy, Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM '09, pp.135-146, 2009.

M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti et al., Abusing Social Networks for Automated User Profiling, RAID, 2010.
DOI : 10.1007/978-3-642-15512-3_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.9258

S. Bartunov, A. Korshunov, S. Park, W. Ryu, and H. Lee, Joint link-attribute user identity resolution in online social networks, SNA- KDD Workshop, 2012.

F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, Detecting spammers on Twitter, Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010.

F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, Characterizing user behavior in online social networks, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.49-62, 2009.
DOI : 10.1145/1644893.1644900

C. Bettini, X. S. Wang, and S. Jajodia, Protecting Privacy Against Location-Based Personal Identification, Proceedings of the Second VDLB International Conference on Secure Data Management, SDM'05, pp.185-199, 2005.
DOI : 10.1007/11552338_13

I. Bhattacharya and L. Getoor, Collective entity resolution in relational data, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217304

P. Bhattacharya, S. Ghosh, J. Kulshrestha, M. Mondal, M. Bilal-zafar et al., Deep Twitter diving, Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, CSCW '14, pp.197-210, 2014.
DOI : 10.1145/2531602.2531636

L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, pp.551-560, 2009.
DOI : 10.1145/1526709.1526784

S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009.
DOI : 10.1145/1578002.1578010

J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov, "You Might Also Like:" Privacy Risks of Collaborative Filtering, 2011 IEEE Symposium on Security and Privacy, pp.231-246, 2011.
DOI : 10.1109/SP.2011.40

Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, Aiding the detection of fake accounts in large scale social online services, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pp.15-15

Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, Aiding the detection of fake accounts in large scale social online services, NSDI, 2012.

C. Castelluccia, C. Abdelberi, M. Dürmuth, and D. Perito, When privacy meets security: Leveraging personal information for password cracking, 1304.

S. Cha, Comprehensive survey on distance / similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, issue.4, pp.300-307, 2007.

A. Chaabane, G. Acs, and M. A. Kaafar, You are what you like! information leakage through users' interests, Proceedings of the 19th Annual Network & Distributed System Security Symposium, NDSS '12, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00748162

R. Chaytor, Privacy advisors for personal information management, SIGIR Workshop on Personal Information Management, SIGIR Workshop on Personal Information Management, 2006.

T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli, Is more always merrier?, Proceedings of the 2012 ACM workshop on Workshop on online social networks, WOSN '12, 2012.
DOI : 10.1145/2342549.2342565

URL : https://hal.archives-ouvertes.fr/hal-00748154

Z. Cheng, J. Caverlee, and K. Lee, You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.759-768, 2010.
DOI : 10.1145/1871437.1871535

Z. Cheng, J. Caverlee, and K. Lee, You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, 2010.
DOI : 10.1145/1871437.1871535

P. Christen, Data Matching -Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-centric systems and applications, 2012.

P. Christen, A survey of indexing techniques for scalable record linkage and deduplication. Knowledge and Data Engineering, IEEE Transactions on, vol.24, issue.9, pp.1537-1555, 2012.

W. W. Cohen, P. Ravikumar, and S. E. Fienberg, A comparison of string distance metrics for name-matching tasks, IIWeb, 2003.

S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis et al., The Wi-Fi privacy ticker, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, pp.321-330, 2010.
DOI : 10.1145/1864349.1864398

D. J. Crandall, L. Backstrom, D. Huttenlocher, and J. Kleinberg, Mapping the world's photos, Proceedings of the 18th international conference on World wide web, WWW '09, pp.761-770, 2009.
DOI : 10.1145/1526709.1526812

C. Emiliano-de-cristofaro, G. Soriente, A. Tsudik, and . Williams, Hummingbird: Privacy at the time of twitter, Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp.285-299

D. Mathieu-cunche, R. Kaafar, and . Boreli, I know who you will meet this evening! linking wireless devices using wi-fi probe requests, 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoW- MoM), pp.1-9, 2012.

L. A. Cutillo, R. Molva, and T. Strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, pp.4794-101, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

Y. De-mulder, G. Danezis, L. Batina, and B. Preneel, Identification via location-profiling in GSM networks, Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES '08, pp.23-32, 2008.
DOI : 10.1145/1456403.1456409

A. K. Elmagarmid, P. G. Ipeirotis, and V. S. Verykios, Duplicate Record Detection: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.1, pp.1-16, 2007.
DOI : 10.1109/TKDE.2007.250581

URL : http://archive.nyu.edu/bitstream/2451/14760/5/tkde2007.pdf

W. Enck, P. Gilbert, L. P. Byung-gon-chun, J. Cox, P. Jung et al., TaintDroid, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pp.1-6, 2010.
DOI : 10.1145/2619091

C. Farkas and S. Jajodia, The inference problem, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.6-11, 2002.
DOI : 10.1145/772862.772864

E. Stephen and . Fienberg, Comment on gates: Toward a reconceptualization of confidentiality protection in the context of linkages with administrative records, Journal of Privacy and Confidentiality, vol.3, p.65, 2011.

M. Fredrikson and B. Livshits, RePriv: Re-imagining Content Personalization and In-browser Privacy, 2011 IEEE Symposium on Security and Privacy, pp.131-146, 2011.
DOI : 10.1109/SP.2011.37

J. Freudiger, R. Neu, and J. Pierre-hubaux, Private sharing of user location over online social networks, 2010.

J. Freudiger, R. Shokri, and J. Hubaux, Evaluating the Privacy Risk of Location-Based Services, Proceedings of the 15th International Conference on Financial Cryptography and Data Security, pp.31-46, 2012.
DOI : 10.1007/978-3-642-27576-0_3

G. Friedland, G. Maier, R. Sommer, and N. Weaver, Sherlock holmes' evil twin, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.105-114, 2011.
DOI : 10.1145/2073276.2073287

G. Friedland, G. Maier, R. Sommer, and N. Weaver, Sherlock holmes' evil twin, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.105-114, 2011.
DOI : 10.1145/2073276.2073287

G. Friedland and R. Sommer, Cybercasing the joint: On the privacy implications of geo-tagging, Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec'10, pp.1-8, 2010.

G. W. Gates, How uncertainty about privacy and confidentiality is hampering efforts to more effectively use administrative records in producing u.s. national statistics, Journal of Privacy and Confidentiality, 2011.

D. Gayo and A. , All liaisons are dangerous when all your friends are known to us, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, pp.171-180, 2011.

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, Private queries in location based services, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.121-132, 2008.
DOI : 10.1145/1376616.1376631

P. Golle, Revisiting the uniqueness of simple demographics in the US population, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, pp.77-80, 2006.
DOI : 10.1145/1179601.1179615

P. Golle, A study on the re-identifiability of dutch citizens, 3rd Hot Topics in Privacy Enhancing Technologies, 2010.

P. Golle and K. Partridge, On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, Pervasive '09, pp.390-397, 2009.
DOI : 10.1007/978-3-642-01516-8_26

E. Neil-zhenqiang-gong, R. Chul, A. Shin, E. Talwalkar, and . Stefanov, Jointly predicting links and inferring attributes using a social-attribute network (san, SNA-KDD, pp.2-12

W. Neil-zhenqiang-gong, L. Xu, P. Huang, E. Mittal, V. Stefanov et al., Evolution of social-attribute networks: Measurements, modeling, and implications using google+, Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC '12, pp.131-144, 2012.

B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan et al., Improving wireless privacy with an identifier-free link layer protocol, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.40-53, 2008.
DOI : 10.1145/1378600.1378607

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.7069

V. Griffith and M. Jakobsson, Messin' with texas deriving mother's maiden names using public records, Proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS'05, pp.91-103, 2005.

R. Gross and A. Acquisti, Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005.
DOI : 10.1145/1102199.1102214

M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

S. Guha, B. Cheng, and P. Francis, Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.81-87, 2010.
DOI : 10.1145/1879141.1879152

S. Guha, B. Cheng, and P. Francis, Privad: Practical privacy in online advertising, Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, pp.13-13, 2011.

S. Han, J. Jung, and D. Wetherall, A study of third-party tracking by mobile apps in the wild

C. Bing-zhe-he, Y. Chen, H. Su, and . Sun, A defence scheme against identity theft attack based on multiple social networks, Expert Syst. Appl, vol.41, issue.5, pp.2345-2352, 2014.

J. He, W. W. Chu, . Victor, and . Liu, Inferring Privacy Information from Social Networks, Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, ISI'06, pp.154-165, 2006.
DOI : 10.1007/11760146_14

B. Hecht, L. Hong, B. Suh, and E. H. Chi, Tweets from Justin Bieber's heart, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.237-246, 2011.
DOI : 10.1145/1978942.1978976

L. Humphreys, P. Gill, and B. Krishnamurthy, How much is too much? Privacy issues on Twitter, pp.1-29, 2010.

M. P. Hussey, P. A. Baranov, T. E. Mcardle, T. M. Boesenberg, and B. Duggal, Distributed personal information aggregator, p.98, 2010.

T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, Identifying users across social tagging systems, In ICWSM, 2011.

D. Irani, S. Webb, K. Li, and C. Pu, Large Online Social Footprints--An Emerging Threat, 2009 International Conference on Computational Science and Engineering, 2009.
DOI : 10.1109/CSE.2009.459

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.493.5032

D. Irani, S. Webb, K. Li, and C. Pu, Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks, IEEE Internet Computing, vol.15, issue.3, pp.13-19, 2011.
DOI : 10.1109/MIC.2011.25

C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell, Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.737-744, 2006.
DOI : 10.1145/1135777.1135884

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, 2007.
DOI : 10.1145/1290958.1290968

M. Jakobsson and S. Myers, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, 2006.
DOI : 10.1002/0470086106

. Christians, H. Jensen, M. Lu, and . Yiu, Location privacy techniques in client-server architectures, Privacy in Location-Based Applications, pp.31-58, 2009.

C. Jernigan, F. T. Behram, and . Mistree, Gaydar: Facebook friendships expose sexual orientation, First Monday, vol.14, issue.10, 2009.
DOI : 10.5210/fm.v14i10.2611

L. Jin, H. Takabi, and J. B. Joshi, Towards active detection of identity clone attacks on online social networks, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.27-38, 2011.
DOI : 10.1145/1943513.1943520

J. Jonas and J. Harper, Effective Counterterrorism and the Limited Role of Predictive Data Mining, 2006.

K. Sp?rck and J. , A statistical interpretation of term specificity and its application in retrieval, Journal of Documentation, vol.28, pp.11-21, 1972.

J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis et al., Privacy oracle, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.279-288, 2008.
DOI : 10.1145/1455770.1455806

P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, Preventing location-based identity inference in anonymous spatial queries. Knowledge and Data Engineering, IEEE Transactions on, vol.19, issue.12, pp.1719-1733, 2007.

A. Keith, B. , E. Durbin, and M. A. Salinger, Identity theft, Journal of Economic Perspectives, 2008.

V. Keselj, F. Peng, N. Cercone, and C. Thomas, N-gram-based author profiles for authorship attribution, Pacific Association for Computational Linguistics, 2003.

S. Kinsella, V. Murdock, and N. O. Hare, "I'm eating a sandwich in Glasgow", Proceedings of the 3rd international workshop on Search and mining user-generated contents, SMUC '11, pp.61-68, 2011.
DOI : 10.1145/2065023.2065039

G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos, Detecting social network profile cloning, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.295-300, 2011.
DOI : 10.1109/PERCOMW.2011.5766886

H. Köpcke and E. Rahm, Frameworks for entity matching: A comparison, Data & Knowledge Engineering, vol.69, issue.2, pp.197-210, 2010.
DOI : 10.1016/j.datak.2009.10.003

N. Korula and S. Lattanzi, An efficient reconciliation algorithm for social networks, Proceedings of the VLDB Endowment, vol.7, issue.5, pp.377-388, 2014.
DOI : 10.14778/2732269.2732274

G. Kossinets and D. Watts, Empirical Analysis of an Evolving Social Network, Science, vol.311, issue.5757, pp.31188-90, 2006.
DOI : 10.1126/science.1116869

D. Kotz, T. Henderson, and I. Abyzov, CRAWDAD data set dartmouth/campus (v. 2004-12-18) Downloaded from http, 2004.

B. Krishnamurthy, P. Gill, and M. Arlitt, A few chirps about twitter, Proceedings of the first workshop on Online social networks, WOSP '08, pp.19-24, 2008.
DOI : 10.1145/1397735.1397741

B. Krishnamurthy, D. Malandrino, and C. E. Wills, Measuring privacy loss and the impact of privacy protection in web browsing, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.52-63, 2007.
DOI : 10.1145/1280680.1280688

B. Krishnamurthy and C. Wills, Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009.
DOI : 10.1145/1526709.1526782

B. Krishnamurthy and C. E. Wills, Generating a privacy footprint on the internet, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.65-70, 2006.
DOI : 10.1145/1177080.1177088

B. Krishnamurthy and C. E. Wills, Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008.
DOI : 10.1145/1397735.1397744

B. Krishnamurthy and C. E. Wills, On the leakage of personally identifiable information via online social networks, Proceedings of the 2Nd ACM Workshop on Online Social Networks, WOSN '09, pp.7-12, 2009.

B. Krishnamurthy and C. E. Wills, Privacy leakage in mobile online social networks, Proceedings of the 3rd Conference on Online Social Networks, WOSN'10, pp.4-4

J. Krumm, Inference Attacks on Location Tracks, Proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE'07, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

J. Krumm, A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2009.
DOI : 10.1007/s00779-008-0212-5

R. Kumar, J. Novak, and A. Tomkins, Structure and evolution of online social networks, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '06, pp.611-617, 2006.

S. Kumar, R. Zafarani, and H. Liu, Understanding user migration patterns in social media, 2011.

H. Kwak, C. Lee, H. Park, and S. Moon, What is Twitter, a social network or a news media?, Proceedings of the 19th international conference on World wide web, WWW '10, pp.591-600, 2010.
DOI : 10.1145/1772690.1772751

S. Labitzke, I. Taranu, and H. Hartenstein, What's in a name?: An unsupervised approach to link users across communities, SNA-KDD, SNA-KDD '11, 2011.

A. C. Cliff, N. Lampe, C. Ellison, and . Steinfield, A familiar face(book): Profile elements as signals in an online social network, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, pp.435-444, 2007.

J. Leskovec, L. Backstrom, R. Kumar, and A. Tomkins, Microscopic evolution of social networks, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, pp.462-470, 2008.
DOI : 10.1145/1401890.1401948

F. Li, J. Chen, X. Zou, and P. Liu, New privacy threats in healthcare informatics: When medical records join the web, BIOKDD workshop, 2010.

D. Michael, J. Lieberman, and . Lin, You are where you edit: Locating wikipedia contributors through edit histories, 2009.

J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, Inferring private information using social network data, Proceedings of the 18th international conference on World wide web, WWW '09, pp.1145-1146, 2009.
DOI : 10.1145/1526709.1526899

J. Lindamood and M. Kantarcioglu, Inferring private information using social network data, Proceedings of the 18th international conference on World wide web, WWW '09, 2008.
DOI : 10.1145/1526709.1526899

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.8262

J. Liu, Y. Song, and C. Lin, Competition-based user expertise score estimation, Proceedings of the 34th international ACM SIGIR conference on Research and development in Information, SIGIR '11, pp.425-434, 2011.
DOI : 10.1145/2009916.2009975

J. Liu and F. Zhang, Xinying Song, Young-In Song, Chin-Yew Lin, and Hsiao-Wuen Hon. What's in a name?: An unsupervised approach to link users across communities, Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM '13, pp.495-504, 2013.

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011.
DOI : 10.1145/2068816.2068823

G. David and . Lowe, Distinctive image features from scale-invariant keypoints, Int. J. Comput. Vision, 2004.

Y. T. Chris, D. K. Ma, N. Yau, N. S. Kwan-yip, and . Rao, Privacy vulnerability of published anonymous mobility traces, Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, MobiCom '10, pp.185-196, 2010.

A. Malhotra, L. Totti, W. Meira, P. Kumaraguru, and V. Almeida, Studying User Footprints in Different Online Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012.
DOI : 10.1109/ASONAM.2012.184

S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia, Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, vol.29, issue.2, pp.541-566, 2011.
DOI : 10.1007/s00778-010-0213-7

J. R. Mayer and J. C. Mitchell, Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.413-427
DOI : 10.1109/SP.2012.47

M. Mcpherson, L. Smith-lovin, and J. M. Cook, Birds of a Feather: Homophily in Social Networks, This article consists of 30, p.page(s), 2001.
DOI : 10.1146/annurev.soc.27.1.415

M. Michelson and S. A. Macskassy, Discovering users' topics of interest on twitter, Proceedings of the fourth workshop on Analytics for noisy unstructured text data, AND '10, pp.73-80, 2010.
DOI : 10.1145/1871840.1871852

A. Mishari, G. Mishari, and . Tsudik, Exploring linkability of user reviews, ESORICS, 2012.

A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, Measurement and analysis of online social networks, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.29-42, 2007.
DOI : 10.1145/1298306.1298311

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pp.251-260, 2010.
DOI : 10.1145/1718487.1718519

S. Mittal, User Privacy and the Evolution of Third-Party Tracking Mechanisms on the World Wide Web, SSRN. SSRN, 2010.
DOI : 10.2139/ssrn.2005252

A. Miyazaki, Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage, Journal of Public Policy & Marketing, vol.27, issue.1, 2008.
DOI : 10.1509/jppm.27.1.19

A. Mohaisen, D. Hong, and D. Nyang, Privacy in Location Based Services: Primitives Toward the Solution, 2008 Fourth International Conference on Networked Computing and Advanced Information Management, pp.572-579, 2008.
DOI : 10.1109/NCM.2008.137

M. Motoyama and G. Varghese, I seek you, Proceeding of the eleventh international workshop on Web information and data management, WIDM '09, 2009.
DOI : 10.1145/1651587.1651604

A. Narayanan, H. Paskov, N. Z. Gong, J. Bethencourt, E. Stefanov et al., On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.46

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.22

A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, Location privacy via private proximity testing, NDSS, 2011.

M. E. Newman, Communities, modules and large-scale structure in networks, Nature Physics, vol.9, issue.1, pp.25-31, 2011.
DOI : 10.1038/nature06830

T. Carlton, . Northern, L. Michael, and . Nelson, An unsupervised approach to discovering and disambiguating social media profiles, 2007.

T. Oscherwitz, Synthetic identity fraud: Unseen identity challenge, BANK. SECURITY NEWS, 2005.

B. Pang and L. Lee, Opinion Mining and Sentiment Analysis, Foundations and Trends?? in Information Retrieval, vol.2, issue.1???2, pp.1-135, 2008.
DOI : 10.1561/1500000011

P. Kumaraguru, P. Jain, and A. Joshi, @i seek 'fb.me': Identifying users across multiple online social networks, 2013.

O. Peled, M. Fire, L. Rokach, and Y. Elovici, Entity Matching in Online Social Networks, 2013 International Conference on Social Computing, pp.339-344, 2013.
DOI : 10.1109/SocialCom.2013.53

D. Perito and C. Castelluccia, Mohamed Ali Kâafar, and Pere Manils. How unique and traceable are usernames? In PETS, 2011.

B. Picart, Improved Phone Posterior Estimation Through K-NN and MLP-Based Similarity, 2009.

M. Pontual, A. Gampe, O. Chowdhury, B. Kone, M. Shamim-ashik et al., The privacy in the time of the internet, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.133-140, 2012.
DOI : 10.1145/2133601.2133618

A. Popescu and G. Grefenstette, Mining user home location and gender from flickr tags, ICWSM 2010 : International Conference on Weblogs and Social Media, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00725193

J. Foster, T. Provost, R. Fawcett, and . Kohavi, The case against accuracy estimation for comparing induction algorithms, Proceedings of the Fifteenth International Conference on Machine Learning, ICML '98, pp.445-453, 1998.

E. Raad, R. Chbeir, and A. Dipanda, User Profile Matching in Social Networks, 2010 13th International Conference on Network-Based Information Systems, pp.297-304, 2010.
DOI : 10.1109/NBiS.2010.35

URL : https://hal.archives-ouvertes.fr/hal-00643509

D. Recordon and D. Reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006.
DOI : 10.1145/1179529.1179532

F. Roesner, T. Kohno, and D. Wetherall, Detecting and defending against third-party tracking on the web, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pp.12-12

C. Ruiz-vicente, D. Freni, C. Bettini, and C. S. Jensen, Location-Related Privacy in Geo-Social Networks, IEEE Internet Computing, vol.15, issue.3, pp.20-27, 2011.
DOI : 10.1109/MIC.2011.29

T. , S. Saponas, J. Lester, C. Hartung, S. Agarwal et al., Devices that tell on you: Privacy trends in consumer ubiquitous computing, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium , SS'07, pp.1-5, 2007.

R. Schmid, Salesforce service cloud ? featuring activision, 2012.

S. Naveen-kumar-sharma, F. Ghosh, N. Benevenuto, K. Ganguly, and . Gummadi, Inferring who-is-who in the Twitter social network, ACM SIGCOMM Computer Communication Review, vol.42, issue.4, pp.533-538, 2012.
DOI : 10.1145/2377677.2377782

R. Shokri, G. Theodorakopoulos, G. Danezis, J. Hubaux, and J. Boudec, Quantifying Location Privacy: The Case of Sporadic Location Exposure, Privacy Enhancing Technologies, pp.57-76, 2011.
DOI : 10.1007/978-3-642-22263-4_4

R. Shokri, G. Theodorakopoulos, J. Boudec, and J. Hubaux, Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011.
DOI : 10.1109/SP.2011.18

URL : https://hal.archives-ouvertes.fr/hal-01266229

C. Andrew and . Simpson, On privacy and public data: a study of data.gov.uk, Journal of Privacy and Confidentiality, 2011.

M. Srivatsa and M. Hicks, Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382262

J. Staddon and . Finding, Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy, Proceedings of the 2nd ACM workshop on Security and artificial intelligence, AISec '09, pp.11-14, 2009.
DOI : 10.1145/1654988.1654992

T. Stein, E. Chen, and K. Mangla, Facebook immune system, Proceedings of the 4th Workshop on Social Network Systems, SNS '11, pp.1-8, 2011.
DOI : 10.1145/1989656.1989664

A. Stolcke, Srilm -an extensible language modeling toolkit, Proceedings of Int'l conference on Spoken Language Processing, 2002.

D. W. Stout, http://dustn.tv/active-users-2013, 2013.

Y. San-tsai-sun, K. Boshmaf, K. Hawkey, and . Beznosov, A billion keys, but few locks: The crisis of web single sign-on, Proceedings of the 2010 Workshop on New Security Paradigms, pp.61-72, 2010.

L. Sweeney, Weaving Technology and Policy Together to Maintain Confidentiality, The Journal of Law, Medicine & Ethics, vol.310, issue.8, pp.98-110, 1997.
DOI : 10.1056/NEJM199511233332112

K. A. Taipale, Data mining and domestic security: Connecting the dots to make sense of data, Columbia Science and Technology Law Review, vol.5, issue.2, 2003.

K. Thomas, C. Grier, and D. M. Nicol, unFriendly: Multi-party Privacy Risks in Social Networks, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10, pp.236-252, 2010.
DOI : 10.1007/978-3-642-14527-8_14

V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas, Adnostic: Privacy preserving targeted advertising, NDSS. The Internet Society, 2010.

M. Tranmer and M. Elliot, Binary logistic regression Cathie Marsh for Census and Survey Research, 1920.

B. Viswanath, M. Mondal, A. Clement, P. Druschel, K. P. Gummadi et al., Exploring the design space of social network-based Sybil defenses, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pp.1-8, 2012.
DOI : 10.1109/COMSNETS.2012.6151333

B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, On the evolution of user interaction in Facebook, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pp.37-42, 2009.
DOI : 10.1145/1592665.1592675

B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, An analysis of social network-based sybil defenses, Proceedings of the ACM SIGCOMM, 2010.

J. Vosecky, D. Hong, and V. Y. Shen, User identification across multiple social networks, 2009 First International Conference on Networked Digital Technologies, pp.360-365, 2009.
DOI : 10.1109/NDT.2009.5272173

G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger et al., Social turing tests: Crowdsourcing sybil detection, NDSS, 2013.

G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger et al., Social turing tests: Crowdsourcing sybil detection, NDSS, 2013.

Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson, I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks, 2011 IEEE Symposium on Security and Privacy, pp.147-161, 2011.
DOI : 10.1109/SP.2011.23

J. Weng, E. Lim, J. Jiang, and Q. He, TwitterRank, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pp.261-270, 2010.
DOI : 10.1145/1718487.1718520

D. Wetherall, D. Choffnes, B. Greenstein, S. Han, P. Hornyack et al., Privacy revelations for web and mobile apps, Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems, HotOS'13, pp.21-21, 2011.

C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao, User interactions in social networks and their implications, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.205-218, 2009.
DOI : 10.1145/1519065.1519089

E. William and . Winkler, The state of record linkage and current research problems, Statistical Research Division, U.S. Bureau of the Census, 1999.

W. E. Winkler, E. William, . Winkler, and P. Nov, Overview of record linkage and current research directions, Bureau of the Census, 2006.

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.21

Y. Ting-fang-yen, F. Xie, R. P. Yu, M. Yu, and . Abadi, Host fingerprinting and tracking on the web: Privacy and security implications, NDSS, 2012.

. Gae-won-you, . Seung-won, Z. Hwang, J. Nie, and . Wen, Socialsearch: enhancing entity search with social network matching, EDBT/ICDT, 2011.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, Sybilguard: Defending against sybil attacks via social networks, Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06, pp.267-278, 2006.

R. Zafarani and H. Liu, Connecting corresponding identities across communities, 2009.

R. Zafarani and H. Liu, Connecting users across social media sites, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, pp.41-49, 2013.
DOI : 10.1145/2487575.2487648

H. Zang and J. Bolot, Anonymization of location data does not work, Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, pp.145-156, 2011.
DOI : 10.1145/2030613.2030630

C. Michael, Z. , and V. Paxson, Detecting and analyzing automated activity on twitter, Proceedings of the 12th International Conference on Passive and Active Measurement, pp.102-111, 2011.

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009.
DOI : 10.1145/1526709.1526781