H. Achrekar, A. Gandhe, R. Lazarus, S. H. Yu, and B. Liu, Predicting Flu Trends using Twitter data, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.702-707, 2011.
DOI : 10.1109/INFCOMW.2011.5928903

URL : http://www.cs.uml.edu/~bliu/pub/CPNS_2011.pdf

P. Boldi, F. Bonchi, A. Gionis, and T. Tassa, Injecting uncertainty in graphs for identity obfuscation, Proceedings of the VLDB Endowment, vol.5, issue.11, pp.1376-1387, 2012.
DOI : 10.14778/2350229.2350254

F. Bonchi, A. Gionis, and T. Tassa, Identity obfuscation in graphs through the information theoretic lens, Proceedings of the International Conference on Data Engineering. pp. 924?935. ICDE, 2011.

A. Campan and T. M. Truta, Data and Structural k-Anonymity in Social Networks, pp.33-54978, 2008.
DOI : 10.1109/ICDE.2008.4497459

URL : http://www.nku.edu/~trutat1/papers/LNCS09_campan.pdf

A. Culotta, N. K. Ravi, and J. Cutler, Predicting the demographics of twitter users from website traffic data, Proc. of the Conference on Artificial Intelligence, pp.72-78, 2015.

C. Dwork, Differential Privacy, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin, Pan-private streaming algorithms, In: Innovations in Computer Science -ICS Proceedings. pp, pp.66-80, 2010.

T. Georgiou, A. Abbadi, and X. Yan, Extracting Topics with Focused Communities for Social Content Recommendation, Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW '17, pp.1432-1443, 2017.
DOI : 10.1007/978-1-4471-4555-4_2

K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, Incognito, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.49-60, 2005.
DOI : 10.1145/1066157.1066164

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217302

A. Nazi, S. Thirumuruganathan, V. Hristidis, N. Zhang, K. Shaban et al., Query Hidden Attributes in Social Networks, 2014 IEEE International Conference on Data Mining Workshop, pp.886-891, 2014.
DOI : 10.1109/ICDMW.2014.113

N. J. Nilsson, Problem-Solving Methods in Artificial Intelligence, 1971.

H. Raymond, K. Murat, and T. Bhavani, Preventing private information inference attacks on social networks, IEEE Trans. Knowl. Data Eng, vol.25, issue.8, pp.1849-1862, 2013.

E. Ryu, Y. Rong, J. Li, and A. Machanavajjhala, curso: protect yourself from curse of attribute inference, Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, DBSocial '13, pp.13-18, 2013.
DOI : 10.1145/2484702.2484706

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

URL : http://spdp.dti.unimi.it/papers/tkde_k-anonymity.pdf

P. Samarati and L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract), Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, p.188, 1998.
DOI : 10.1145/275487.275508

H. Schwartz, J. Eichstaedt, M. Kern, I. L. Dziurzynsk, and S. Ramones, Personality, Gender, and Age in the Language of Social Media: The Open-Vocabulary Approach, PLoS ONE, vol.59, issue.9, 2013.
DOI : 10.1371/journal.pone.0073791.s004

C. E. Shannon, A mathematical theory of communication, ACM SIGMOBILE Mobile Computing and Communications Review, vol.5, issue.1, pp.3-55, 2001.
DOI : 10.1145/584091.584093

L. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

N. Talukder, M. Ouzzani, A. K. Elmagarmid, H. Elmeleegy, and M. Yakout, Privometer: Privacy protection in social networks, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010), pp.266-269, 2010.
DOI : 10.1109/ICDEW.2010.5452715

URL : http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1143&context=ccpubs

T. Tassa and D. J. Cohen, Anonymization of Centralized and Distributed Social Networks by Sequential Clustering, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.2, pp.311-324, 2013.
DOI : 10.1109/TKDE.2011.232

S. Vieweg, A. L. Hughes, K. Starbird, and L. Palen, Microblogging during two natural hazards events, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1079-1088, 2010.
DOI : 10.1145/1753326.1753486

H. Zhang, The optimality of naive bayes, AA, vol.1, issue.2, p.3, 2004.

E. Zheleva and L. Getoor, Preserving the Privacy of Sensitive Relationships in Graph Data, International Conference on Privacy, Security, and Trust in KDD, pp.153-171, 2008.
DOI : 10.1007/978-3-540-78478-4_9

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009.
DOI : 10.1145/1526709.1526781