Predicting Flu Trends using Twitter data, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.702-707, 2011. ,
DOI : 10.1109/INFCOMW.2011.5928903
URL : http://www.cs.uml.edu/~bliu/pub/CPNS_2011.pdf
Injecting uncertainty in graphs for identity obfuscation, Proceedings of the VLDB Endowment, vol.5, issue.11, pp.1376-1387, 2012. ,
DOI : 10.14778/2350229.2350254
Identity obfuscation in graphs through the information theoretic lens, Proceedings of the International Conference on Data Engineering. pp. 924?935. ICDE, 2011. ,
Data and Structural k-Anonymity in Social Networks, pp.33-54978, 2008. ,
DOI : 10.1109/ICDE.2008.4497459
URL : http://www.nku.edu/~trutat1/papers/LNCS09_campan.pdf
Predicting the demographics of twitter users from website traffic data, Proc. of the Conference on Artificial Intelligence, pp.72-78, 2015. ,
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Pan-private streaming algorithms, In: Innovations in Computer Science -ICS Proceedings. pp, pp.66-80, 2010. ,
Extracting Topics with Focused Communities for Social Content Recommendation, Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW '17, pp.1432-1443, 2017. ,
DOI : 10.1007/978-1-4471-4555-4_2
Incognito, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.49-60, 2005. ,
DOI : 10.1145/1066157.1066164
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
DOI : 10.1145/1217299.1217302
Query Hidden Attributes in Social Networks, 2014 IEEE International Conference on Data Mining Workshop, pp.886-891, 2014. ,
DOI : 10.1109/ICDMW.2014.113
Problem-Solving Methods in Artificial Intelligence, 1971. ,
Preventing private information inference attacks on social networks, IEEE Trans. Knowl. Data Eng, vol.25, issue.8, pp.1849-1862, 2013. ,
curso: protect yourself from curse of attribute inference, Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, DBSocial '13, pp.13-18, 2013. ,
DOI : 10.1145/2484702.2484706
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
URL : http://spdp.dti.unimi.it/papers/tkde_k-anonymity.pdf
Generalizing data to provide anonymity when disclosing information (abstract), Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, p.188, 1998. ,
DOI : 10.1145/275487.275508
Personality, Gender, and Age in the Language of Social Media: The Open-Vocabulary Approach, PLoS ONE, vol.59, issue.9, 2013. ,
DOI : 10.1371/journal.pone.0073791.s004
A mathematical theory of communication, ACM SIGMOBILE Mobile Computing and Communications Review, vol.5, issue.1, pp.3-55, 2001. ,
DOI : 10.1145/584091.584093
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.571-588, 2002. ,
DOI : 10.1142/S021848850200165X
Privometer: Privacy protection in social networks, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010), pp.266-269, 2010. ,
DOI : 10.1109/ICDEW.2010.5452715
URL : http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1143&context=ccpubs
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.2, pp.311-324, 2013. ,
DOI : 10.1109/TKDE.2011.232
Microblogging during two natural hazards events, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1079-1088, 2010. ,
DOI : 10.1145/1753326.1753486
The optimality of naive bayes, AA, vol.1, issue.2, p.3, 2004. ,
Preserving the Privacy of Sensitive Relationships in Graph Data, International Conference on Privacy, Security, and Trust in KDD, pp.153-171, 2008. ,
DOI : 10.1007/978-3-540-78478-4_9
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009. ,
DOI : 10.1145/1526709.1526781