more powerful anonymization/de-anonymization ap-
proaches.
ACKNOWLEDGEMENTS
This work was supported in part by NSF award num-
bers SaTC-1526493, CNS-1218817, CNS-1553437,
CNS-1409415, CNS-1423139, CCF-1617286, and
faculty research awards from Google, Cisco and In-
tel.
REFERENCES
Andersen, R., Borgs, C., Chayes, J., Feige, U., Flaxman, A.,
Kalai, A., Mirrokni, V., and Tennenholtz, M. (2008).
Trust-based recommendation systems: an axiomatic
approach. In WWW.
Backstrom, L., Dwork, C., and Kleinberg, J. (2007).
Wherefore art thou r3579x?: anonymized social net-
works, hidden patterns, and structural steganography.
In WWW.
Buccafurri, F., Lax, G., Nocera, A., and Ursino, D. (2015).
Discovering missing me edges across social networks.
Information Sciences.
Dwork, C. (2006). Differential privacy. In Encyclopedia of
Cryptography and Security. Springer.
Erd
˝
os, P. and R
´
enyi, A. (1976). On the evolution of random
graphs. Selected Papers of Alfr
´
ed R
´
enyi.
Fabiana, C., Garetto, M., and Leonardi, E. (2015). De-
anonymizing scale-free social networks by percola-
tion graph matching. In INFOCOM.
Hamming, R. W. (1950). Error detecting and error correct-
ing codes. Bell System technical journal.
Hay, M., Miklau, G., Jensen, D., Towsley, D., and Weis,
P. (2008). Resisting structural re-identification in
anonymized social networks. VLDB Endowment.
Hay, M., Miklau, G., Jensen, D., Weis, P., and Srivastava,
S. (2007). Anonymizing social networks. Computer
Science Department Faculty Publication Series.
Ji, S., Li, W., Gong, N. Z., Mittal, P., and Beyah, R. (2015a).
On your social network de-anonymizablity: Quantifi-
cation and large scale evaluation with seed knowledge.
In NDSS.
Ji, S., Li, W., Mittal, P., Hu, X., and Beyah, R. (2015b). Sec-
graph: A uniform and open-source evaluation system
for graph data anonymization and de-anonymization.
In USENIX Security Symposium.
Ji, S., Li, W., Srivatsa, M., and Beyah, R. (2014). Structural
data de-anonymization: Quantification, practice, and
implications. In CCS.
Korula, N. and Lattanzi, S. (2014). An efficient reconcilia-
tion algorithm for social networks. Proceedings of the
VLDB Endowment.
Liu, C., Chakraborty, S., and Mittal, P. (2016). Dependence
makes you vulnerable: Differential privacy under de-
pendent tuples. In NDSS.
Liu, C. and Mittal, P. (2016). Linkmirage: Enabling
privacy-preserving analytics on social relationships.
In NDSS.
Liu, K. and Terzi, E. (2008). Towards identity anonymiza-
tion on graphs. In SIGMOD.
Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkita-
subramaniam, M. (2007). l-diversity: Privacy beyond
k-anonymity. ACM Transactions on Knowledge Dis-
covery from Data.
Mittal, P., Papamanthou, C., and Song, D. (2013a). Preserv-
ing link privacy in social network based systems. In
NDSS.
Mittal, P., Wright, M., and Borisov, N. (2013b). Pisces:
Anonymous communication using social networks.
NDSS.
Narayanan, A. and Shmatikov, V. (2008). Robust de-
anonymization of large sparse datasets. IEEE S&P.
Narayanan, A. and Shmatikov, V. (2009). De-anonymizing
social networks. IEEE S&P.
Newman, M. (2010). Networks: an introduction. Oxford
University Press.
Newman, M. E. (2003). The structure and function of com-
plex networks. SIAM review.
Nilizadeh, S., Kapadia, A., and Ahn, Y.-Y. (2014).
Community-enhanced de-anonymization of online so-
cial networks. In CCS.
Pedarsani, P., Figueiredo, D. R., and Grossglauser, M.
(2013). A bayesian method for matching two similar
graphs without seeds. In Allerton.
Pedarsani, P. and Grossglauser, M. (2011). On the privacy
of anonymized networks. In SIGKDD.
Pham, H., Shahabi, C., and Liu, Y. (2013). Ebm: an
entropy-based model to infer social strength from spa-
tiotemporal data. In SIGMOD.
Sala, A., Zhao, X., Wilson, C., Zheng, H., and Zhao, B. Y.
(2011). Sharing graphs using differentially private
graph models. In IMC.
Sharad, K. and Danezis, G. (2013). De-anonymizing d4d
datasets. In Workshop on Hot Topics in Privacy En-
hancing Technologies.
Sharad, K. and Danezis, G. (2014). An automated social
graph de-anonymization technique. In Proceedings of
the 13th Workshop on Privacy in the Electronic Soci-
ety. ACM.
Srivatsa, M. and Hicks, M. (2012). Deanonymizing mobil-
ity traces: Using social network as a side-channel. In
CCS.
Viswanath, B., Mislove, A., Cha, M., and Gummadi, K. P.
(2009). On the evolution of user interaction in face-
book. In ACM workshop on Online social networks.
Yu, H., Gibbons, P. B., Kaminsky, M., and Xiao, F. (2008).
Sybillimit: A near-optimal social network defense
against sybil attacks. In IEEE S&P.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
134