@inproceedings{Backstrom:2007:WAT:1242572.1242598, abstract = {In a social network, nodes correspond topeople or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anonymization replaces names with meaningless unique identifiers. We describe a family of attacks such that even from a single anonymized copy of a social network, it is possible for an adversary to learn whether edges exist or not between specific targeted pairs of nodes.}, acmid = {1242598}, address = {New York, NY, USA}, author = {Backstrom, Lars and Dwork, Cynthia and Kleinberg, Jon}, booktitle = {Proceedings of the 16th international conference on World Wide Web}, doi = {10.1145/1242572.1242598}, interhash = {aa7d0f96c372d2c03d228f27a7f4b66b}, intrahash = {913059fcbf0453c60ff8b79e2705742c}, isbn = {978-1-59593-654-7}, location = {Banff, Alberta, Canada}, numpages = {10}, pages = {181--190}, publisher = {ACM}, series = {WWW '07}, title = {Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography}, url = {http://doi.acm.org/10.1145/1242572.1242598}, year = 2007 }