{"id":"https://openalex.org/W1998801249","doi":"https://doi.org/10.1109/glocom.2011.6133607","title":"De-Anonymizing Dynamic Social Networks","display_name":"De-Anonymizing Dynamic Social Networks","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W1998801249","doi":"https://doi.org/10.1109/glocom.2011.6133607","mag":"1998801249"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2011.6133607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6133607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074531806","display_name":"X. X. Ding","orcid":"https://orcid.org/0000-0002-2807-2597"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuan Ding","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100322308","display_name":"Lan Zhang","orcid":"https://orcid.org/0009-0009-3743-0024"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lan Zhang","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043935709","display_name":"Zhiguo Wan","orcid":"https://orcid.org/0000-0003-1319-1224"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguo Wan","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100846520","display_name":"Ming Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Gu","raw_affiliation_strings":["Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua Nat. Lab. for Inf. Sci. & Technol. Sch. of Software, Tsinghua Univ., Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074531806"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":3.9472,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.93584647,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8117952346801758},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.6500436663627625},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6181690096855164},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.6149280071258545},{"id":"https://openalex.org/keywords/dynamic-network-analysis","display_name":"Dynamic network analysis","score":0.602730393409729},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5441644191741943},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5405563116073608},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.47816282510757446},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.4666315019130707},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45186641812324524},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4040333926677704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.380924254655838},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.36928510665893555},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.2413569986820221},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20985066890716553},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19345059990882874},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.17782703042030334},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0947558581829071}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8117952346801758},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.6500436663627625},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6181690096855164},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.6149280071258545},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.602730393409729},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5441644191741943},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5405563116073608},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.47816282510757446},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.4666315019130707},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45186641812324524},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4040333926677704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.380924254655838},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36928510665893555},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2413569986820221},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20985066890716553},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19345059990882874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.17782703042030334},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0947558581829071},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2011.6133607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6133607","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5400000214576721,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W577407893","https://openalex.org/W1579505926","https://openalex.org/W1977843657","https://openalex.org/W1998091733","https://openalex.org/W2096296626","https://openalex.org/W2109369020","https://openalex.org/W2124849257","https://openalex.org/W2128248866","https://openalex.org/W2135930857","https://openalex.org/W2143445293","https://openalex.org/W2159675343","https://openalex.org/W2163263459","https://openalex.org/W2611980959","https://openalex.org/W4285719527","https://openalex.org/W6616695347","https://openalex.org/W6676151878","https://openalex.org/W6738000383"],"related_works":["https://openalex.org/W3021077433","https://openalex.org/W2153689444","https://openalex.org/W136304283","https://openalex.org/W4362644772","https://openalex.org/W2978783953","https://openalex.org/W2086584178","https://openalex.org/W4385611918","https://openalex.org/W2994727564","https://openalex.org/W2564793090","https://openalex.org/W2767099985"],"abstract_inverted_index":{"Online":[0],"social":[1,60,72,81,151,164],"network":[2,61,73,82,165],"data":[3,26,65,166],"are":[4],"increasingly":[5],"made":[6],"publicly":[7],"available":[8],"to":[9,19,34,129,145],"third":[10],"parties.":[11],"Recent":[12],"studies":[13],"show":[14,88],"that":[15,89],"it":[16],"is":[17,67,142],"possible":[18],"recover":[20],"sensitive":[21],"information":[22],"from":[23],"the":[24,41,55,96,105,109,118,143],"released":[25,106],"and":[27,49,75,116,153],"several":[28],"anonymization":[29],"techniques":[30],"have":[31,44],"been":[32],"proposed":[33],"protect":[35],"individual":[36],"privacy.":[37],"However,":[38],"most":[39],"of":[40,58,71,79,104,111,148],"existing":[42],"defenses":[43],"focused":[45],"on":[46,137,160],"``one-time''":[47],"releases":[48],"do":[50],"not":[51],"take":[52],"into":[53],"consideration":[54],"re-":[56],"publication":[57],"dynamic":[59,80,150],"data.":[62],"Re-":[63],"publishing":[64],"periodically":[66],"a":[68],"natural":[69],"result":[70],"evolution":[74],"an":[76],"emerging":[77],"requirement":[78],"analysis.":[83],"In":[84],"this":[85,140],"paper,":[86],"we":[87,122],"by":[90],"utilizing":[91],"correlations":[92],"between":[93],"sequential":[94],"releases,":[95],"adversary":[97],"can":[98],"achieve":[99],"high":[100],"precision":[101],"in":[102,163],"de-anonymization":[103],"data,":[107,139],"suppressing":[108],"uncertainty":[110],"re-identifying":[112],"each":[113],"release":[114],"separately":[115],"synthesizing":[117],"results":[119],"afterwards.":[120],"Besides,":[121],"combine":[123],"structural":[124],"knowledge":[125],"with":[126],"node":[127],"attributes":[128],"compromise":[130],"graph":[131],"modification":[132],"based":[133],"defenses.":[134],"With":[135],"experiments":[136],"real":[138],"work":[141],"first":[144],"demonstrate":[146],"feasibility":[147],"de-anonymizing":[149],"networks":[152],"should":[154],"arouse":[155],"concern":[156],"for":[157],"future":[158],"works":[159],"privacy":[161],"preservation":[162],"publishing.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
