{"id":"https://openalex.org/W2592611757","doi":"https://doi.org/10.5220/0006192501260135","title":"Quantification of De-anonymization Risks in Social Networks","display_name":"Quantification of De-anonymization Risks in Social Networks","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2592611757","doi":"https://doi.org/10.5220/0006192501260135","mag":"2592611757"},"language":"en","primary_location":{"id":"doi:10.5220/0006192501260135","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006192501260135","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0006192501260135","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021920823","display_name":"Wei-Han Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei-Han Lee","raw_affiliation_strings":["Princeton University, United States"],"affiliations":[{"raw_affiliation_string":"Princeton University, United States","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103101104","display_name":"Changchang Liu","orcid":"https://orcid.org/0000-0003-3111-0782"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Changchang Liu","raw_affiliation_strings":["Princeton University, United States"],"affiliations":[{"raw_affiliation_string":"Princeton University, United States","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Georgia Institute of Technology and Zhejiang University, United States"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology and Zhejiang University, United States","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015619835","display_name":"Prateek Mittal","orcid":"https://orcid.org/0000-0002-4057-0118"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prateek Mittal","raw_affiliation_strings":["Princeton University, United States"],"affiliations":[{"raw_affiliation_string":"Princeton University, United States","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063492677","display_name":"Ruby Lee","orcid":"https://orcid.org/0000-0001-5562-2171"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruby Lee","raw_affiliation_strings":["Princeton University, United States"],"affiliations":[{"raw_affiliation_string":"Princeton University, United States","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021920823"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.5851,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74285575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"126","last_page":"135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6536189317703247},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3588497042655945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6536189317703247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3588497042655945}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0006192501260135","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006192501260135","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0006192501260135","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006192501260135","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"The":[0],"risks":[1],"of":[2,67,82,139,162,169],"publishing":[3],"privacy-sensitive":[4],"data":[5,22,36,47,70],"have":[6,14],"received":[7],"considerable":[8],"attention":[9],"recently.":[10],"Several":[11],"de-anonymization":[12,50,59,98,128,151,164,172],"attacks":[13,60,129,165,173],"been":[15],"proposed":[16],"to":[17,75,135],"re-identify":[18],"individuals":[19],"even":[20],"if":[21],"anonymization":[23,43],"techniques":[24,44],"were":[25],"applied.":[26],"However,":[27],"there":[28],"is":[29,39,86],"no":[30,107],"theoretical":[31,117],"quantification":[32,104],"for":[33,119],"relating":[34],"the":[35,42,46,58,65,68,80,87,92,110,137,148,160,167,175],"utility":[37,66,96],"that":[38],"preserved":[40],"by":[41,72],"and":[45,61,97,147,166],"vulnerability":[48],"against":[49],"attacks.":[51],"\r\nIn":[52],"this":[53,85],"paper,":[54],"we":[55,125,157],"theoretically":[56,149],"analyze":[57],"provide":[62],"conditions":[63],"on":[64,90,130],"anonymized":[69,73,95],"(denoted":[71],"utility)":[74],"achieve":[76],"successful":[77],"de-anonymization.":[78],"To":[79],"best":[81],"our":[83,103,155],"knowledge,":[84],"first":[88],"work":[89],"quantifying":[91],"relationships":[93],"between":[94],"capability.":[99],"Unlike":[100],"previous":[101,140,163],"work,":[102],"analysis":[105],"requires":[106],"assumptions":[108],"about":[109],"graph":[111],"model,":[112],"thus":[113],"providing":[114],"a":[115,131],"general":[116],"guide":[118],"developing":[120],"practical":[121],"de-anonymization/anonymization":[122],"techniques.":[123],"\r\nFurthermore,":[124],"evaluate":[126],"state-of-the-art":[127],"real-world":[132],"Facebook":[133],"dataset":[134],"show":[136],"limitations":[138],"work.":[141],"By":[142],"comparing":[143],"these":[144],"experimental":[145],"results":[146],"achievable":[150],"capability":[152],"derived":[153],"in":[154,174],"analysis,":[156],"further":[158],"demonstrate":[159],"ineffectiveness":[161],"potential":[168],"more":[170],"powerful":[171],"future.":[176]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
