1. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography;Backstrom,2007
2. All your contacts are belong to us: automated identity theft attacks on social networks;Bilge,2009
3. Identity obfuscation in graphs through the information theoretic lens;Bonchi;Inf. Sci.,2014
4. Anonymizing graphs;Feder;CoRR,2008
5. On the metric dimension of a graph;Harary;Ars Combinatoria,1976