On the hardness of graph anonymization, Data Mining (ICDM), 2011 IEEE 11th International Conference on, pp.1002-1007, 2011. ,
A random matrix approach to differential privacy and structure preserved social network graph publishing, 2013. ,
Safe realization of the Generalization privacy mechanism, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.16-23, 2011. ,
DOI : 10.1109/PST.2011.5971958
URL : https://hal.archives-ouvertes.fr/hal-00624043
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, pp.181-190 ,
A face is exposed for AOL searcher no. 4417749, New York Times, vol.9, 2008. ,
On the properties of small-world network models, The European Physical Journal B, vol.13, issue.3, pp.547-560, 2000. ,
DOI : 10.1007/s100510050067
Data privacy through optimal kanonymization, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pp.217-228, 2005. ,
Graphes et hypergraphes, 1973. ,
AllAboard: A System for Exploring Urban Mobility and Optimizing Public Transport Using Cellphone Data, Machine learning and knowledge discovery in databases, pp.663-666, 2013. ,
DOI : 10.1007/978-3-642-40994-3_50
Privacy in dynamic social networks, Proceedings of the 19th international conference on World wide web, WWW '10, pp.1059-1060, 2010. ,
DOI : 10.1145/1772690.1772803
The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, pp.107-117, 1998. ,
Data and Structural k-Anonymity in Social Networks, Privacy, Security, and Trust in KDD, pp.33-54, 2009. ,
DOI : 10.1136/sti.2006.023598
Improving data utility in differential privacy and k-anonymity ,
Individual privacy vs population privacy: Learning to attack anonymization. arXiv preprint, 2010. ,
Anonymizing bipartite graph data using safe groupings, Proceedings of the VLDB Endowment, pp.833-844, 2008. ,
Calibrating Noise to Sensitivity in Private Data Analysis, Theory of cryptography, pp.265-284 ,
DOI : 10.1007/11681878_14
Enron cleaned dataset. http://sociograph.blogspot.fr, pp.2013-2024, 2011. ,
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995. ,
Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, p.14, 2010. ,
DOI : 10.1145/1749603.1749605
Genetic algorithms in search, optimization, and machine learning, 1989. ,
Segmentation of towns using call detail records, 2011. ,
A predictive model for the temporal dynamics of information diffusion in online social networks, Proceedings of the 21st international conference companion on World Wide Web, WWW '12 Companion, pp.1145-1152, 2012. ,
DOI : 10.1145/2187980.2188254
URL : https://hal.archives-ouvertes.fr/hal-00680767
Systems and methods for data anonymization, US Patent, vol.20140, p.380489, 2014. ,
An introduction and survey of estimation of distribution algorithms, Swarm and Evolutionary Computation, vol.1, issue.3, pp.111-128, 2011. ,
DOI : 10.1016/j.swevo.2011.08.003
Anonymizing social networks, p.180, 2007. ,
Resisting structural re-identification in anonymized social networks, Proceedings of the VLDB Endowment, pp.102-114, 2008. ,
Java universal network/graph framework, 2014. ,
No free lunch in data privacy, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.193-204, 2011. ,
DOI : 10.1145/1989323.1989345
Introducing the Enron Corpus, CEAS, 2004. ,
Finding frequent patterns in a large sparse graph. Data mining and knowledge discovery, pp.243-271, 2005. ,
Non-interactive differential privacy, Proceedings of the First International Workshop on Open Data, WOD '12, pp.40-52, 2012. ,
DOI : 10.1145/2422604.2422611
URL : https://hal.archives-ouvertes.fr/hal-00691239
The dynamics of viral marketing, ACM Transactions on the Web, vol.1, issue.1, p.5, 2007. ,
DOI : 10.1145/1232722.1232727
Provably private data anonymization: Or, k-anonymity meets differential privacy, p.55, 2011. ,
On the tradeoff between privacy and utility in data publishing, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.517-526, 2009. ,
DOI : 10.1145/1557019.1557079
Anonymizing Graphs Against Weight-Based Attacks, 2010 IEEE International Conference on Data Mining Workshops, pp.491-498, 2010. ,
DOI : 10.1109/ICDMW.2010.112
Preventing Identity Disclosure in Hypergraphs, 2011 IEEE 11th International Conference on Data Mining Workshops, pp.659-665, 2011. ,
DOI : 10.1109/ICDMW.2011.139
Anonymizing Hypergraphs with Community Preservation, 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.185-190, 2011. ,
DOI : 10.1109/PDCAT.2011.21
Mobile Customer Clustering Based on Call Detail Records for Marketing Campaigns, 2009 International Conference on Management and Service Science, pp.1-4, 2009. ,
DOI : 10.1109/ICMSS.2009.5302716
Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.93-106, 2008. ,
DOI : 10.1145/1376616.1376629
Privacy preserving in social networks against sensitive edge disclosure, Computer, 2008. ,
Graph Anonymization Using Machine Learning, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp.1111-1118, 2014. ,
DOI : 10.1109/AINA.2014.20
URL : https://hal.archives-ouvertes.fr/hal-01060592
Dp-where: Differentially private modeling of human mobility, Big Data, 2013 IEEE International Conference on, pp.580-588, 2013. ,
An investigation of data privacy and utility preservation using knn classification as a gauge, 2013. ,
How to break anonymity of the Netflix prize dataset. arXiv preprint cs, 2006. ,
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
The structure and function of complex networks, SIAM review, vol.45, issue.2, pp.167-256, 2003. ,
Transparent government, not transparent citizens: a report on privacy and transparency for the cabinet office, 2011. ,
Broken promises of privacy: Responding to the surprising failure of anonymization, UCLA Law Review, vol.57, p.1701, 2010. ,
Seed and Grow: An attack against anonymized social networks, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.587-595, 2012. ,
DOI : 10.1109/SECON.2012.6275831
Spectral centrality measures in complex networks, Physical Review E, vol.78, issue.3, p.36107, 2008. ,
DOI : 10.1103/PhysRevE.78.036107
The Telecommunications Illustrated Dictionary, 2002. ,
Sharing graphs using differentially private graph models, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.81-98, 2011. ,
DOI : 10.1145/2068816.2068825
De-anonymizing D4D datasets, Workshop on Hot Topics in Privacy Enhancing Technologies ,
An Automated Social Graph De-anonymization Technique, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.47-58, 2014. ,
DOI : 10.1145/2665943.2665960
Efficient Time-Stamped Event Sequence Anonymization, ACM Transactions on the Web, vol.8, issue.1, p.4, 2013. ,
DOI : 10.1145/2532643
On the privacy and utility of anonymized social networks, Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, pp.246-253, 2011. ,
Enhancing data utility in differential privacy via microaggregation-based $$k$$ k -anonymity, The VLDB Journal, vol.23, issue.8 ,
DOI : 10.1007/s00778-014-0351-4
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
State-of-the-art anonymisation of medical records using an iterative machine learning framework, Journal of the American Medical Informatics Association, vol.14, issue.5, pp.574-580, 2007. ,
DOI : 10.1197/jamia.M2441
Structural Diversity for Privacy in Publishing Social Networks, SDM, pp.35-46, 2011. ,
DOI : 10.1137/1.9781611972818.4
Identities Anonymization in Dynamic Social Networks, 2011 IEEE 11th International Conference on Data Mining, pp.1224-1229, 2011. ,
DOI : 10.1109/ICDM.2011.78
Privacy-preserving social network publication against friendship attacks, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1262-1270, 2011. ,
DOI : 10.1145/2020408.2020599
A Guide to Differential Privacy Theory in Social Network Analysis, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.411-417, 2012. ,
DOI : 10.1109/ASONAM.2012.73
Exploration and analysis of massive mobile phone data: A layered visual analytics approach, Proceedings of the 3rd International Conference on the Analysis of Mobile Phone Datasets (Net- Mob'13), 2013. ,
Exploration and analysis of massive mobile phone data: A layered visual analytics approach, Proceedings of the 3rd International Conference on the Analysis of Mobile Phone Datasets (NetMob'13), 2013. ,
Evaluation of data anonymization tools, DBKDA, pp.163-168, 2012. ,
Privacy: a machine learning view Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.8, pp.939-948, 2004. ,
Privacy aware learning, Advances in Neural Information Processing Systems, pp.1430-1438, 2012. ,
Differential Privacy Preserving Spectral Graph Analysis, Advances in Knowledge Discovery and Data Mining, pp.329-340 ,
DOI : 10.1007/978-3-642-37456-2_28
Collective dynamics of small-worldnetworks, nature, vol.393, issue.6684, pp.440-442, 1998. ,
A genetic algorithm tutorial, Statistics and Computing, vol.4, issue.2, pp.65-85, 1994. ,
DOI : 10.1007/BF00175354
Estimation of distribution algorithm ? wikipedia, the free encyclopedia , 2013. URL http://en.wikipedia.org/w/index.php?title=Estimation_of_ distribution_algorithm&oldid=550481224. [Online; accessed 12, 2015. ,
On the convergence of an estimation of distribution algorithm based on linkage discovery and factorization, Proceedings of the 7th annual conference on Genetic and evolutionary computation, pp.695-702 ,
A Survey of Privacy-Preservation of Graphs and Social Networks, Managing and Mining Graph Data, pp.421-453 ,
DOI : 10.1007/978-1-4419-6045-0_14
Randomizing Social Networks: a Spectrum Preserving Approach, SDM, pp.739-750, 2008. ,
DOI : 10.1137/1.9781611972788.67
Graph Generation with Prescribed Feature Constraints, Proceedings of the 9th SIAM Conference on Data Mining, pp.966-977, 2009. ,
DOI : 10.1137/1.9781611972795.83
PrivGene, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.665-676, 2013. ,
DOI : 10.1145/2463676.2465330
Edge Anonymity in Social Network Graphs, 2009 International Conference on Computational Science and Engineering, pp.1-8, 2009. ,
DOI : 10.1109/CSE.2009.310
On the Convergence of a Class of Estimation of Distribution Algorithms, IEEE Transactions on Evolutionary Computation, vol.8, issue.2, pp.127-136, 2004. ,
DOI : 10.1109/TEVC.2003.820663
Prediction, Evolution and Privacy in Social and Affiliation Networks, 2011. ,
Preserving the Privacy of Sensitive Relationships in Graph Data, PinKDD, pp.153-171, 2007. ,
DOI : 10.1007/978-3-540-78478-4_9
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009. ,
DOI : 10.1145/1526709.1526781
Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008. ,
DOI : 10.1109/ICDE.2008.4497459
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems, vol.2, issue.1, pp.47-77, 2011. ,
DOI : 10.1007/s10115-010-0311-2
A brief survey on anonymization techniques for privacy preserving publishing of social network data, ACM SIGKDD Explorations Newsletter, vol.10, issue.2, pp.12-22, 2008. ,
DOI : 10.1145/1540276.1540279
k-automorphism, Proceedings of the VLDB Endowment, pp.946-957, 2009. ,
DOI : 10.14778/1687627.1687734