C. Charu, Y. Aggarwal, . Li, S. Philip, and . Yu, On the hardness of graph anonymization, Data Mining (ICDM), 2011 IEEE 11th International Conference on, pp.1002-1007, 2011.

F. Ahmed, R. Jin, and A. X. Liu, A random matrix approach to differential privacy and structure preserved social network graph publishing, 2013.

T. Allard, B. Nguyen, and P. Pucheral, Safe realization of the Generalization privacy mechanism, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.16-23, 2011.
DOI : 10.1109/PST.2011.5971958

URL : https://hal.archives-ouvertes.fr/hal-00624043

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, pp.181-190

M. Barbaro and T. Zeller, A face is exposed for AOL searcher no. 4417749, New York Times, vol.9, 2008.

A. Barrat and M. Weigt, On the properties of small-world network models, The European Physical Journal B, vol.13, issue.3, pp.547-560, 2000.
DOI : 10.1007/s100510050067

J. Roberto, R. Bayardo, and . Agrawal, Data privacy through optimal kanonymization, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pp.217-228, 2005.

C. Berge, Graphes et hypergraphes, 1973.

M. Berlingerio, F. Calabrese, G. D. Lorenzo, R. Nair, F. Pinelli et al., AllAboard: A System for Exploring Urban Mobility and Optimizing Public Transport Using Cellphone Data, Machine learning and knowledge discovery in databases, pp.663-666, 2013.
DOI : 10.1007/978-3-642-40994-3_50

S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava, Privacy in dynamic social networks, Proceedings of the 19th international conference on World wide web, WWW '10, pp.1059-1060, 2010.
DOI : 10.1145/1772690.1772803

S. Brin and L. Page, The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, pp.107-117, 1998.

A. Campan and T. M. Truta, Data and Structural k-Anonymity in Social Networks, Privacy, Security, and Trust in KDD, pp.33-54, 2009.
DOI : 10.1136/sti.2006.023598

J. Soria and C. , Improving data utility in differential privacy and k-anonymity

G. Cormode, Individual privacy vs population privacy: Learning to attack anonymization. arXiv preprint, 2010.

G. Cormode, D. Srivastava, T. Yu, and Q. Zhang, Anonymizing bipartite graph data using safe groupings, Proceedings of the VLDB Endowment, pp.833-844, 2008.

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Theory of cryptography, pp.265-284
DOI : 10.1007/11681878_14

C. Enron and . Dataset, Enron cleaned dataset. http://sociograph.blogspot.fr, pp.2013-2024, 2011.

E. Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995.

B. Fung, K. Wang, R. Chen, S. Philip, and . Yu, Privacy-preserving data publishing, ACM Computing Surveys, vol.42, issue.4, p.14, 2010.
DOI : 10.1145/1749603.1749605

E. David and . Golberg, Genetic algorithms in search, optimization, and machine learning, 1989.

R. Guigoures and M. Boullé, Segmentation of towns using call detail records, 2011.

A. Guille and H. Hacid, A predictive model for the temporal dynamics of information diffusion in online social networks, Proceedings of the 21st international conference companion on World Wide Web, WWW '12 Companion, pp.1145-1152, 2012.
DOI : 10.1145/2187980.2188254

URL : https://hal.archives-ouvertes.fr/hal-00680767

H. Hacid and L. Maag, Systems and methods for data anonymization, US Patent, vol.20140, p.380489, 2014.

M. Hauschild and M. Pelikan, An introduction and survey of estimation of distribution algorithms, Swarm and Evolutionary Computation, vol.1, issue.3, pp.111-128, 2011.
DOI : 10.1016/j.swevo.2011.08.003

M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, Anonymizing social networks, p.180, 2007.

M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, Resisting structural re-identification in anonymized social networks, Proceedings of the VLDB Endowment, pp.102-114, 2008.

J. Library, Java universal network/graph framework, 2014.

D. Kifer and A. Machanavajjhala, No free lunch in data privacy, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.193-204, 2011.
DOI : 10.1145/1989323.1989345

B. Klimt and Y. Yang, Introducing the Enron Corpus, CEAS, 2004.

M. Kuramochi and G. Karypis, Finding frequent patterns in a large sparse graph. Data mining and knowledge discovery, pp.243-271, 2005.

D. Leoni, Non-interactive differential privacy, Proceedings of the First International Workshop on Open Data, WOD '12, pp.40-52, 2012.
DOI : 10.1145/2422604.2422611

URL : https://hal.archives-ouvertes.fr/hal-00691239

J. Leskovec, A. Lada, . Adamic, A. Bernardo, and . Huberman, The dynamics of viral marketing, ACM Transactions on the Web, vol.1, issue.1, p.5, 2007.
DOI : 10.1145/1232722.1232727

N. Li, H. Wahbeh, D. Qardaji, and . Su, Provably private data anonymization: Or, k-anonymity meets differential privacy, p.55, 2011.

T. Li and N. Li, On the tradeoff between privacy and utility in data publishing, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.517-526, 2009.
DOI : 10.1145/1557019.1557079

Y. Li and H. Shen, Anonymizing Graphs Against Weight-Based Attacks, 2010 IEEE International Conference on Data Mining Workshops, pp.491-498, 2010.
DOI : 10.1109/ICDMW.2010.112

Y. Li and H. Shen, Preventing Identity Disclosure in Hypergraphs, 2011 IEEE 11th International Conference on Data Mining Workshops, pp.659-665, 2011.
DOI : 10.1109/ICDMW.2011.139

Y. Li and H. Shen, Anonymizing Hypergraphs with Community Preservation, 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.185-190, 2011.
DOI : 10.1109/PDCAT.2011.21

Q. Lin and Y. Wan, Mobile Customer Clustering Based on Call Detail Records for Marketing Campaigns, 2009 International Conference on Management and Service Science, pp.1-4, 2009.
DOI : 10.1109/ICMSS.2009.5302716

K. Liu and E. Terzi, Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.93-106, 2008.
DOI : 10.1145/1376616.1376629

L. Liu, J. Wang, J. Liu, and J. Zhang, Privacy preserving in social networks against sensitive edge disclosure, Computer, 2008.

M. L. Maag, L. Denoyer, and P. Gallinari, Graph Anonymization Using Machine Learning, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp.1111-1118, 2014.
DOI : 10.1109/AINA.2014.20

URL : https://hal.archives-ouvertes.fr/hal-01060592

J. Darakhshan, S. Mir, R. Isaacman, M. Cáceres, R. N. Martonosi et al., Dp-where: Differentially private modeling of human mobility, Big Data, 2013 IEEE International Conference on, pp.580-588, 2013.

K. Mivule and C. Turner, An investigation of data privacy and utility preservation using knn classification as a gauge, 2013.

A. Narayanan and V. Shmatikov, How to break anonymity of the Netflix prize dataset. arXiv preprint cs, 2006.

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

E. Mark and . Newman, The structure and function of complex networks, SIAM review, vol.45, issue.2, pp.167-256, 2003.

O. Kieron and . Hara, Transparent government, not transparent citizens: a report on privacy and transparency for the cabinet office, 2011.

P. Ohm, Broken promises of privacy: Responding to the surprising failure of anonymization, UCLA Law Review, vol.57, p.1701, 2010.

W. Peng, F. Li, X. Zou, and J. Wu, Seed and Grow: An attack against anonymized social networks, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.587-595, 2012.
DOI : 10.1109/SECON.2012.6275831

N. Perra and S. Fortunato, Spectral centrality measures in complex networks, Physical Review E, vol.78, issue.3, p.36107, 2008.
DOI : 10.1103/PhysRevE.78.036107

K. Julie and . Petersen, The Telecommunications Illustrated Dictionary, 2002.

A. Sala, X. Zhao, C. Wilson, H. Zheng, Y. Ben et al., Sharing graphs using differentially private graph models, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.81-98, 2011.
DOI : 10.1145/2068816.2068825

K. Sharad and G. Danezis, De-anonymizing D4D datasets, Workshop on Hot Topics in Privacy Enhancing Technologies

K. Sharad and G. Danezis, An Automated Social Graph De-anonymization Technique, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.47-58, 2014.
DOI : 10.1145/2665943.2665960

R. Sherkat, J. Li, and N. Mamoulis, Efficient Time-Stamped Event Sequence Anonymization, ACM Transactions on the Web, vol.8, issue.1, p.4, 2013.
DOI : 10.1145/2532643

Y. Song, S. Nobari, X. Lu, P. Karras, and S. Bressan, On the privacy and utility of anonymized social networks, Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, pp.246-253, 2011.

J. Soria-comas, J. Domingo-ferrer, D. Sánchez, and S. Martínez, Enhancing data utility in differential privacy via microaggregation-based $$k$$ k -anonymity, The VLDB Journal, vol.23, issue.8
DOI : 10.1007/s00778-014-0351-4

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

G. Szarvas, R. Farkas, and R. Busa-fekete, State-of-the-art anonymisation of medical records using an iterative machine learning framework, Journal of the American Medical Informatics Association, vol.14, issue.5, pp.574-580, 2007.
DOI : 10.1197/jamia.M2441

C. Tai, Y. Philip, D. Yang, and M. Chen, Structural Diversity for Privacy in Publishing Social Networks, SDM, pp.35-46, 2011.
DOI : 10.1137/1.9781611972818.4

C. Tai, P. Tseng, S. Philip, M. Yu, and . Chen, Identities Anonymization in Dynamic Social Networks, 2011 IEEE 11th International Conference on Data Mining, pp.1224-1229, 2011.
DOI : 10.1109/ICDM.2011.78

C. Tai, S. Philip, D. Yu, M. Yang, and . Chen, Privacy-preserving social network publication against friendship attacks, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1262-1270, 2011.
DOI : 10.1145/2020408.2020599

C. Task and C. Clifton, A Guide to Differential Privacy Theory in Social Network Analysis, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.411-417, 2012.
DOI : 10.1109/ASONAM.2012.73

. Stef-van-den-elzen, D. Dh-jorik-blaas, J. Holten, . Buenen, J. Jarke et al., Exploration and analysis of massive mobile phone data: A layered visual analytics approach, Proceedings of the 3rd International Conference on the Analysis of Mobile Phone Datasets (Net- Mob'13), 2013.

S. Van-den-elzen, D. Dh-jorik-blaas, J. Holten, . Buenen, J. Jarke et al., Exploration and analysis of massive mobile phone data: A layered visual analytics approach, Proceedings of the 3rd International Conference on the Analysis of Mobile Phone Datasets (NetMob'13), 2013.

S. Vinogradov and A. Pastsyak, Evaluation of data anonymization tools, DBKDA, pp.163-168, 2012.

A. Staal and . Vinterbo, Privacy: a machine learning view Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.8, pp.939-948, 2004.

J. Martin, . Wainwright, I. Michael, . Jordan, C. John et al., Privacy aware learning, Advances in Neural Information Processing Systems, pp.1430-1438, 2012.

Y. Wang, X. Wu, and L. Wu, Differential Privacy Preserving Spectral Graph Analysis, Advances in Knowledge Discovery and Data Mining, pp.329-340
DOI : 10.1007/978-3-642-37456-2_28

J. Duncan, . Watts, H. Steven, and . Strogatz, Collective dynamics of small-worldnetworks, nature, vol.393, issue.6684, pp.440-442, 1998.

D. Whitley, A genetic algorithm tutorial, Statistics and Computing, vol.4, issue.2, pp.65-85, 1994.
DOI : 10.1007/BF00175354

. Wikipedia, Estimation of distribution algorithm ? wikipedia, the free encyclopedia , 2013. URL http://en.wikipedia.org/w/index.php?title=Estimation_of_ distribution_algorithm&oldid=550481224. [Online; accessed 12, 2015.

H. Alden, S. Wright, and . Pulavarty, On the convergence of an estimation of distribution algorithm based on linkage discovery and factorization, Proceedings of the 7th annual conference on Genetic and evolutionary computation, pp.695-702

X. Wu, X. Ying, K. Liu, and L. Chen, A Survey of Privacy-Preservation of Graphs and Social Networks, Managing and Mining Graph Data, pp.421-453
DOI : 10.1007/978-1-4419-6045-0_14

X. Ying and X. Wu, Randomizing Social Networks: a Spectrum Preserving Approach, SDM, pp.739-750, 2008.
DOI : 10.1137/1.9781611972788.67

X. Ying and X. Wu, Graph Generation with Prescribed Feature Constraints, Proceedings of the 9th SIAM Conference on Data Mining, pp.966-977, 2009.
DOI : 10.1137/1.9781611972795.83

J. Zhang, X. Xiao, Y. Yang, Z. Zhang, and M. Winslett, PrivGene, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.665-676, 2013.
DOI : 10.1145/2463676.2465330

L. Zhang and W. Zhang, Edge Anonymity in Social Network Graphs, 2009 International Conference on Computational Science and Engineering, pp.1-8, 2009.
DOI : 10.1109/CSE.2009.310

Q. Zhang and H. Muhlenbein, On the Convergence of a Class of Estimation of Distribution Algorithms, IEEE Transactions on Evolutionary Computation, vol.8, issue.2, pp.127-136, 2004.
DOI : 10.1109/TEVC.2003.820663

E. Zheleva, Prediction, Evolution and Privacy in Social and Affiliation Networks, 2011.

E. Zheleva and L. Getoor, Preserving the Privacy of Sensitive Relationships in Graph Data, PinKDD, pp.153-171, 2007.
DOI : 10.1007/978-3-540-78478-4_9

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009.
DOI : 10.1145/1526709.1526781

B. Zhou and J. Pei, Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
DOI : 10.1109/ICDE.2008.4497459

B. Zhou and J. Pei, The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems, vol.2, issue.1, pp.47-77, 2011.
DOI : 10.1007/s10115-010-0311-2

B. Zhou, J. Pei, and W. Luk, A brief survey on anonymization techniques for privacy preserving publishing of social network data, ACM SIGKDD Explorations Newsletter, vol.10, issue.2, pp.12-22, 2008.
DOI : 10.1145/1540276.1540279

L. Zou, L. Chen, and . Tamer¨ozsu, k-automorphism, Proceedings of the VLDB Endowment, pp.946-957, 2009.
DOI : 10.14778/1687627.1687734