1. Turning privacy leaks into floods: surreptitious discovery of social network friendships and other sensitive binary attribute vectors;Asuncion,2010
2. All liaisons are dangerous when all your friends are known to us;Avello,2011
3. Wherefore art thou r3579x?:anonymized social networks, hidden patterns, and structural steganography;Backstrom,2007
4. All your contacts are belong to us: automated identity theft attacks on social networks;Bilge,2009
5. Eight friends are enough: social graph approximation via public listings;Bonneau,2009