Faces of facebook: Privacy in the age of augmented reality, BlackHat, 2011. ,
Analysis of topological characteristics of huge online social networking services, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.835-844, 2007. ,
DOI : 10.1145/1242572.1242685
Lotusnet: Tunable privacy for distributed online social network services, Computer Communications, vol.35, issue.1, pp.75-88, 2012. ,
Dynamics of personal social relationships in online social networks, Proceedings of the first ACM conference on Online social networks, COSN '13, pp.15-26, 2013. ,
DOI : 10.1145/2512938.2512949
Four degrees of separation, Proceedings of the 3rd Annual ACM Web Science Conference on, WebSci '12, pp.33-42 ,
DOI : 10.1145/2380718.2380723
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th International Conference on World Wide Web, WWW '07, pp.181-190, 2007. ,
Find me if you can, Proceedings of the 19th international conference on World wide web, WWW '10, pp.61-70, 2010. ,
DOI : 10.1145/1772690.1772698
Persona: An online social network with user-defined privacy, Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM '09, pp.135-146, 2009. ,
Abusing Social Networks for Automated User Profiling, RAID, 2010. ,
DOI : 10.1007/978-3-642-15512-3_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.9258
Joint link-attribute user identity resolution in online social networks, SNA- KDD Workshop, 2012. ,
Detecting spammers on Twitter, Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010. ,
Characterizing user behavior in online social networks, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.49-62, 2009. ,
DOI : 10.1145/1644893.1644900
Protecting Privacy Against Location-Based Personal Identification, Proceedings of the Second VDLB International Conference on Secure Data Management, SDM'05, pp.185-199, 2005. ,
DOI : 10.1007/11552338_13
Collective entity resolution in relational data, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
DOI : 10.1145/1217299.1217304
Deep Twitter diving, Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, CSCW '14, pp.197-210, 2014. ,
DOI : 10.1145/2531602.2531636
All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, pp.551-560, 2009. ,
DOI : 10.1145/1526709.1526784
PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009. ,
DOI : 10.1145/1578002.1578010
"You Might Also Like:" Privacy Risks of Collaborative Filtering, 2011 IEEE Symposium on Security and Privacy, pp.231-246, 2011. ,
DOI : 10.1109/SP.2011.40
Aiding the detection of fake accounts in large scale social online services, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pp.15-15 ,
Aiding the detection of fake accounts in large scale social online services, NSDI, 2012. ,
When privacy meets security: Leveraging personal information for password cracking, 1304. ,
Comprehensive survey on distance / similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, issue.4, pp.300-307, 2007. ,
You are what you like! information leakage through users' interests, Proceedings of the 19th Annual Network & Distributed System Security Symposium, NDSS '12, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00748162
Privacy advisors for personal information management, SIGIR Workshop on Personal Information Management, SIGIR Workshop on Personal Information Management, 2006. ,
Is more always merrier?, Proceedings of the 2012 ACM workshop on Workshop on online social networks, WOSN '12, 2012. ,
DOI : 10.1145/2342549.2342565
URL : https://hal.archives-ouvertes.fr/hal-00748154
You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.759-768, 2010. ,
DOI : 10.1145/1871437.1871535
You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, 2010. ,
DOI : 10.1145/1871437.1871535
Data Matching -Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-centric systems and applications, 2012. ,
A survey of indexing techniques for scalable record linkage and deduplication. Knowledge and Data Engineering, IEEE Transactions on, vol.24, issue.9, pp.1537-1555, 2012. ,
A comparison of string distance metrics for name-matching tasks, IIWeb, 2003. ,
The Wi-Fi privacy ticker, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, pp.321-330, 2010. ,
DOI : 10.1145/1864349.1864398
Mapping the world's photos, Proceedings of the 18th international conference on World wide web, WWW '09, pp.761-770, 2009. ,
DOI : 10.1145/1526709.1526812
Hummingbird: Privacy at the time of twitter, Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp.285-299 ,
I know who you will meet this evening! linking wireless devices using wi-fi probe requests, 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoW- MoM), pp.1-9, 2012. ,
Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, pp.4794-101, 2009. ,
DOI : 10.1109/MCOM.2009.5350374
URL : https://hal.archives-ouvertes.fr/hal-00687143
Identification via location-profiling in GSM networks, Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES '08, pp.23-32, 2008. ,
DOI : 10.1145/1456403.1456409
Duplicate Record Detection: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.1, pp.1-16, 2007. ,
DOI : 10.1109/TKDE.2007.250581
URL : http://archive.nyu.edu/bitstream/2451/14760/5/tkde2007.pdf
TaintDroid, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pp.1-6, 2010. ,
DOI : 10.1145/2619091
The inference problem, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.6-11, 2002. ,
DOI : 10.1145/772862.772864
Comment on gates: Toward a reconceptualization of confidentiality protection in the context of linkages with administrative records, Journal of Privacy and Confidentiality, vol.3, p.65, 2011. ,
RePriv: Re-imagining Content Personalization and In-browser Privacy, 2011 IEEE Symposium on Security and Privacy, pp.131-146, 2011. ,
DOI : 10.1109/SP.2011.37
Private sharing of user location over online social networks, 2010. ,
Evaluating the Privacy Risk of Location-Based Services, Proceedings of the 15th International Conference on Financial Cryptography and Data Security, pp.31-46, 2012. ,
DOI : 10.1007/978-3-642-27576-0_3
Sherlock holmes' evil twin, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.105-114, 2011. ,
DOI : 10.1145/2073276.2073287
Sherlock holmes' evil twin, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.105-114, 2011. ,
DOI : 10.1145/2073276.2073287
Cybercasing the joint: On the privacy implications of geo-tagging, Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec'10, pp.1-8, 2010. ,
How uncertainty about privacy and confidentiality is hampering efforts to more effectively use administrative records in producing u.s. national statistics, Journal of Privacy and Confidentiality, 2011. ,
All liaisons are dangerous when all your friends are known to us, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, pp.171-180, 2011. ,
Private queries in location based services, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.121-132, 2008. ,
DOI : 10.1145/1376616.1376631
Revisiting the uniqueness of simple demographics in the US population, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, pp.77-80, 2006. ,
DOI : 10.1145/1179601.1179615
A study on the re-identifiability of dutch citizens, 3rd Hot Topics in Privacy Enhancing Technologies, 2010. ,
On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, Pervasive '09, pp.390-397, 2009. ,
DOI : 10.1007/978-3-642-01516-8_26
Jointly predicting links and inferring attributes using a social-attribute network (san, SNA-KDD, pp.2-12 ,
Evolution of social-attribute networks: Measurements, modeling, and implications using google+, Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC '12, pp.131-144, 2012. ,
Improving wireless privacy with an identifier-free link layer protocol, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.40-53, 2008. ,
DOI : 10.1145/1378600.1378607
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.7069
Messin' with texas deriving mother's maiden names using public records, Proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS'05, pp.91-103, 2005. ,
Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005. ,
DOI : 10.1145/1102199.1102214
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003. ,
DOI : 10.1145/1066116.1189037
Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.81-87, 2010. ,
DOI : 10.1145/1879141.1879152
Privad: Practical privacy in online advertising, Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, pp.13-13, 2011. ,
A study of third-party tracking by mobile apps in the wild ,
A defence scheme against identity theft attack based on multiple social networks, Expert Syst. Appl, vol.41, issue.5, pp.2345-2352, 2014. ,
Inferring Privacy Information from Social Networks, Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, ISI'06, pp.154-165, 2006. ,
DOI : 10.1007/11760146_14
Tweets from Justin Bieber's heart, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.237-246, 2011. ,
DOI : 10.1145/1978942.1978976
How much is too much? Privacy issues on Twitter, pp.1-29, 2010. ,
Distributed personal information aggregator, p.98, 2010. ,
Identifying users across social tagging systems, In ICWSM, 2011. ,
Large Online Social Footprints--An Emerging Threat, 2009 International Conference on Computational Science and Engineering, 2009. ,
DOI : 10.1109/CSE.2009.459
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.493.5032
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks, IEEE Internet Computing, vol.15, issue.3, pp.13-19, 2011. ,
DOI : 10.1109/MIC.2011.25
Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.737-744, 2006. ,
DOI : 10.1145/1135777.1135884
Social phishing, Communications of the ACM, vol.50, issue.10, 2007. ,
DOI : 10.1145/1290958.1290968
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, 2006. ,
DOI : 10.1002/0470086106
Location privacy techniques in client-server architectures, Privacy in Location-Based Applications, pp.31-58, 2009. ,
Gaydar: Facebook friendships expose sexual orientation, First Monday, vol.14, issue.10, 2009. ,
DOI : 10.5210/fm.v14i10.2611
Towards active detection of identity clone attacks on online social networks, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.27-38, 2011. ,
DOI : 10.1145/1943513.1943520
Effective Counterterrorism and the Limited Role of Predictive Data Mining, 2006. ,
A statistical interpretation of term specificity and its application in retrieval, Journal of Documentation, vol.28, pp.11-21, 1972. ,
Privacy oracle, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.279-288, 2008. ,
DOI : 10.1145/1455770.1455806
Preventing location-based identity inference in anonymous spatial queries. Knowledge and Data Engineering, IEEE Transactions on, vol.19, issue.12, pp.1719-1733, 2007. ,
Identity theft, Journal of Economic Perspectives, 2008. ,
N-gram-based author profiles for authorship attribution, Pacific Association for Computational Linguistics, 2003. ,
"I'm eating a sandwich in Glasgow", Proceedings of the 3rd international workshop on Search and mining user-generated contents, SMUC '11, pp.61-68, 2011. ,
DOI : 10.1145/2065023.2065039
Detecting social network profile cloning, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.295-300, 2011. ,
DOI : 10.1109/PERCOMW.2011.5766886
Frameworks for entity matching: A comparison, Data & Knowledge Engineering, vol.69, issue.2, pp.197-210, 2010. ,
DOI : 10.1016/j.datak.2009.10.003
An efficient reconciliation algorithm for social networks, Proceedings of the VLDB Endowment, vol.7, issue.5, pp.377-388, 2014. ,
DOI : 10.14778/2732269.2732274
Empirical Analysis of an Evolving Social Network, Science, vol.311, issue.5757, pp.31188-90, 2006. ,
DOI : 10.1126/science.1116869
CRAWDAD data set dartmouth/campus (v. 2004-12-18) Downloaded from http, 2004. ,
A few chirps about twitter, Proceedings of the first workshop on Online social networks, WOSP '08, pp.19-24, 2008. ,
DOI : 10.1145/1397735.1397741
Measuring privacy loss and the impact of privacy protection in web browsing, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.52-63, 2007. ,
DOI : 10.1145/1280680.1280688
Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009. ,
DOI : 10.1145/1526709.1526782
Generating a privacy footprint on the internet, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.65-70, 2006. ,
DOI : 10.1145/1177080.1177088
Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008. ,
DOI : 10.1145/1397735.1397744
On the leakage of personally identifiable information via online social networks, Proceedings of the 2Nd ACM Workshop on Online Social Networks, WOSN '09, pp.7-12, 2009. ,
Privacy leakage in mobile online social networks, Proceedings of the 3rd Conference on Online Social Networks, WOSN'10, pp.4-4 ,
Inference Attacks on Location Tracks, Proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE'07, pp.127-143, 2007. ,
DOI : 10.1007/978-3-540-72037-9_8
A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2009. ,
DOI : 10.1007/s00779-008-0212-5
Structure and evolution of online social networks, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '06, pp.611-617, 2006. ,
Understanding user migration patterns in social media, 2011. ,
What is Twitter, a social network or a news media?, Proceedings of the 19th international conference on World wide web, WWW '10, pp.591-600, 2010. ,
DOI : 10.1145/1772690.1772751
What's in a name?: An unsupervised approach to link users across communities, SNA-KDD, SNA-KDD '11, 2011. ,
A familiar face(book): Profile elements as signals in an online social network, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, pp.435-444, 2007. ,
Microscopic evolution of social networks, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, pp.462-470, 2008. ,
DOI : 10.1145/1401890.1401948
New privacy threats in healthcare informatics: When medical records join the web, BIOKDD workshop, 2010. ,
You are where you edit: Locating wikipedia contributors through edit histories, 2009. ,
Inferring private information using social network data, Proceedings of the 18th international conference on World wide web, WWW '09, pp.1145-1146, 2009. ,
DOI : 10.1145/1526709.1526899
Inferring private information using social network data, Proceedings of the 18th international conference on World wide web, WWW '09, 2008. ,
DOI : 10.1145/1526709.1526899
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.8262
Competition-based user expertise score estimation, Proceedings of the 34th international ACM SIGIR conference on Research and development in Information, SIGIR '11, pp.425-434, 2011. ,
DOI : 10.1145/2009916.2009975
Xinying Song, Young-In Song, Chin-Yew Lin, and Hsiao-Wuen Hon. What's in a name?: An unsupervised approach to link users across communities, Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM '13, pp.495-504, 2013. ,
Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011. ,
DOI : 10.1145/2068816.2068823
Distinctive image features from scale-invariant keypoints, Int. J. Comput. Vision, 2004. ,
Privacy vulnerability of published anonymous mobility traces, Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, MobiCom '10, pp.185-196, 2010. ,
Studying User Footprints in Different Online Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012. ,
DOI : 10.1109/ASONAM.2012.184
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, vol.29, issue.2, pp.541-566, 2011. ,
DOI : 10.1007/s00778-010-0213-7
Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.413-427 ,
DOI : 10.1109/SP.2012.47
Birds of a Feather: Homophily in Social Networks, This article consists of 30, p.page(s), 2001. ,
DOI : 10.1146/annurev.soc.27.1.415
Discovering users' topics of interest on twitter, Proceedings of the fourth workshop on Analytics for noisy unstructured text data, AND '10, pp.73-80, 2010. ,
DOI : 10.1145/1871840.1871852
Exploring linkability of user reviews, ESORICS, 2012. ,
Measurement and analysis of online social networks, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.29-42, 2007. ,
DOI : 10.1145/1298306.1298311
You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pp.251-260, 2010. ,
DOI : 10.1145/1718487.1718519
User Privacy and the Evolution of Third-Party Tracking Mechanisms on the World Wide Web, SSRN. SSRN, 2010. ,
DOI : 10.2139/ssrn.2005252
Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage, Journal of Public Policy & Marketing, vol.27, issue.1, 2008. ,
DOI : 10.1509/jppm.27.1.19
Privacy in Location Based Services: Primitives Toward the Solution, 2008 Fourth International Conference on Networked Computing and Advanced Information Management, pp.572-579, 2008. ,
DOI : 10.1109/NCM.2008.137
I seek you, Proceeding of the eleventh international workshop on Web information and data management, WIDM '09, 2009. ,
DOI : 10.1145/1651587.1651604
On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.46
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.22
Location privacy via private proximity testing, NDSS, 2011. ,
Communities, modules and large-scale structure in networks, Nature Physics, vol.9, issue.1, pp.25-31, 2011. ,
DOI : 10.1038/nature06830
An unsupervised approach to discovering and disambiguating social media profiles, 2007. ,
Synthetic identity fraud: Unseen identity challenge, BANK. SECURITY NEWS, 2005. ,
Opinion Mining and Sentiment Analysis, Foundations and Trends?? in Information Retrieval, vol.2, issue.1???2, pp.1-135, 2008. ,
DOI : 10.1561/1500000011
@i seek 'fb.me': Identifying users across multiple online social networks, 2013. ,
Entity Matching in Online Social Networks, 2013 International Conference on Social Computing, pp.339-344, 2013. ,
DOI : 10.1109/SocialCom.2013.53
Mohamed Ali Kâafar, and Pere Manils. How unique and traceable are usernames? In PETS, 2011. ,
Improved Phone Posterior Estimation Through K-NN and MLP-Based Similarity, 2009. ,
The privacy in the time of the internet, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.133-140, 2012. ,
DOI : 10.1145/2133601.2133618
Mining user home location and gender from flickr tags, ICWSM 2010 : International Conference on Weblogs and Social Media, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00725193
The case against accuracy estimation for comparing induction algorithms, Proceedings of the Fifteenth International Conference on Machine Learning, ICML '98, pp.445-453, 1998. ,
User Profile Matching in Social Networks, 2010 13th International Conference on Network-Based Information Systems, pp.297-304, 2010. ,
DOI : 10.1109/NBiS.2010.35
URL : https://hal.archives-ouvertes.fr/hal-00643509
OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16, 2006. ,
DOI : 10.1145/1179529.1179532
Detecting and defending against third-party tracking on the web, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pp.12-12 ,
Location-Related Privacy in Geo-Social Networks, IEEE Internet Computing, vol.15, issue.3, pp.20-27, 2011. ,
DOI : 10.1109/MIC.2011.29
Devices that tell on you: Privacy trends in consumer ubiquitous computing, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium , SS'07, pp.1-5, 2007. ,
Salesforce service cloud ? featuring activision, 2012. ,
Inferring who-is-who in the Twitter social network, ACM SIGCOMM Computer Communication Review, vol.42, issue.4, pp.533-538, 2012. ,
DOI : 10.1145/2377677.2377782
Quantifying Location Privacy: The Case of Sporadic Location Exposure, Privacy Enhancing Technologies, pp.57-76, 2011. ,
DOI : 10.1007/978-3-642-22263-4_4
Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011. ,
DOI : 10.1109/SP.2011.18
URL : https://hal.archives-ouvertes.fr/hal-01266229
On privacy and public data: a study of data.gov.uk, Journal of Privacy and Confidentiality, 2011. ,
Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382262
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy, Proceedings of the 2nd ACM workshop on Security and artificial intelligence, AISec '09, pp.11-14, 2009. ,
DOI : 10.1145/1654988.1654992
Facebook immune system, Proceedings of the 4th Workshop on Social Network Systems, SNS '11, pp.1-8, 2011. ,
DOI : 10.1145/1989656.1989664
Srilm -an extensible language modeling toolkit, Proceedings of Int'l conference on Spoken Language Processing, 2002. ,
http://dustn.tv/active-users-2013, 2013. ,
A billion keys, but few locks: The crisis of web single sign-on, Proceedings of the 2010 Workshop on New Security Paradigms, pp.61-72, 2010. ,
Weaving Technology and Policy Together to Maintain Confidentiality, The Journal of Law, Medicine & Ethics, vol.310, issue.8, pp.98-110, 1997. ,
DOI : 10.1056/NEJM199511233332112
Data mining and domestic security: Connecting the dots to make sense of data, Columbia Science and Technology Law Review, vol.5, issue.2, 2003. ,
unFriendly: Multi-party Privacy Risks in Social Networks, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10, pp.236-252, 2010. ,
DOI : 10.1007/978-3-642-14527-8_14
Adnostic: Privacy preserving targeted advertising, NDSS. The Internet Society, 2010. ,
Binary logistic regression Cathie Marsh for Census and Survey Research, 1920. ,
Exploring the design space of social network-based Sybil defenses, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pp.1-8, 2012. ,
DOI : 10.1109/COMSNETS.2012.6151333
On the evolution of user interaction in Facebook, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pp.37-42, 2009. ,
DOI : 10.1145/1592665.1592675
An analysis of social network-based sybil defenses, Proceedings of the ACM SIGCOMM, 2010. ,
User identification across multiple social networks, 2009 First International Conference on Networked Digital Technologies, pp.360-365, 2009. ,
DOI : 10.1109/NDT.2009.5272173
Social turing tests: Crowdsourcing sybil detection, NDSS, 2013. ,
Social turing tests: Crowdsourcing sybil detection, NDSS, 2013. ,
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks, 2011 IEEE Symposium on Security and Privacy, pp.147-161, 2011. ,
DOI : 10.1109/SP.2011.23
TwitterRank, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pp.261-270, 2010. ,
DOI : 10.1145/1718487.1718520
Privacy revelations for web and mobile apps, Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems, HotOS'13, pp.21-21, 2011. ,
User interactions in social networks and their implications, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.205-218, 2009. ,
DOI : 10.1145/1519065.1519089
The state of record linkage and current research problems, Statistical Research Division, U.S. Bureau of the Census, 1999. ,
Overview of record linkage and current research directions, Bureau of the Census, 2006. ,
A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.21
Host fingerprinting and tracking on the web: Privacy and security implications, NDSS, 2012. ,
Socialsearch: enhancing entity search with social network matching, EDBT/ICDT, 2011. ,
Sybilguard: Defending against sybil attacks via social networks, Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06, pp.267-278, 2006. ,
Connecting corresponding identities across communities, 2009. ,
Connecting users across social media sites, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, pp.41-49, 2013. ,
DOI : 10.1145/2487575.2487648
Anonymization of location data does not work, Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, pp.145-156, 2011. ,
DOI : 10.1145/2030613.2030630
Detecting and analyzing automated activity on twitter, Proceedings of the 12th International Conference on Passive and Active Measurement, pp.102-111, 2011. ,
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009. ,
DOI : 10.1145/1526709.1526781