• Logas J, Schlesinger A, Li Z and Das S. (2022). Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy Overlays. Proceedings of the ACM on Human-Computer Interaction. 6:CSCW1. (1-28). Online publication date: 30-Mar-2022.

    https://doi.org/10.1145/3512907

  • Wainakh A, Strassheim A, Grube T, Daubert J and Mühlhäuser M. Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks. Proceedings of the 16th International Conference on Availability, Reliability and Security. (1-11).

    https://doi.org/10.1145/3465481.3465482

  • Waniek M, Woźnica J, Zhou K, Vorobeychik Y, Rahwan T and Michalak T. Strategic Evasion of Centrality Measures. Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems. (1389-1397).

    /doi/10.5555/3463952.3464112

  • Micallef N and Misra G. Towards designing a mobile app that creates avatars for privacy protection. Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct. (79-86).

    https://doi.org/10.1145/3236112.3236123

  • Tadic B, Rohde M and Wulf V. CyberActivist: Tool for Raising Awareness on Privacy and Security of Social Media Use for Activists. Social Computing and Social Media. User Experience and Behavior. (498-510).

    https://doi.org/10.1007/978-3-319-91521-0_36

  • (2017). Situation-based privacy autonomous management for mobile social networks. Computer Communications. 107:C. (75-92). Online publication date: 15-Jul-2017.

    https://doi.org/10.1016/j.comcom.2017.04.003

  • Anthonysamy P, Rashid A and Chitchyan R. Privacy requirements. Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track. (13-22).

    https://doi.org/10.1109/ICSE-SEIS.2017.3

  • Zhao P, Bian K, Zhao T, Song X, Jerry Park J, Li X, Ye F and Yan W. (2017). Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions. IEEE Transactions on Mobile Computing. 16:2. (552-565). Online publication date: 1-Feb-2017.

    https://doi.org/10.1109/TMC.2016.2546245

  • Viejo A and Sánchez D. (2016). Enforcing transparent access to private content in social networks by means of automatic sanitization. Expert Systems with Applications: An International Journal. 62:C. (148-160). Online publication date: 15-Nov-2016.

    https://doi.org/10.1016/j.eswa.2016.06.026

  • Yang H, Soboroff I, Xiong L, Clarke C and Garfinkel S. Privacy-Preserving IR 2016. Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval. (1247-1248).

    https://doi.org/10.1145/2911451.2917763

  • Ahmadinejad S, Fong P and Safavi-Naini R. Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. (829-840).

    https://doi.org/10.1145/2897845.2897878

  • Maheswaran J, Jackowitz D, Zhai E, Wolinsky D and Ford B. Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities. Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. (3-13).

    https://doi.org/10.1145/2857705.2857725

  • Beato F, Meul S and Preneel B. (2016). Practical identity-based private sharing for online social networks. Computer Communications. 73:PB. (243-250). Online publication date: 1-Jan-2016.

    https://doi.org/10.1016/j.comcom.2015.07.009

  • Kim E, Park K, Kim H and Song J. (2015). Design and analysis of enumeration attacks on finding friends with phone numbers. Computers and Security. 52:C. (267-275). Online publication date: 1-Jul-2015.

    https://doi.org/10.1016/j.cose.2015.04.008

  • Schlegel R and Wong D. (2015). Private friends on a social networking site operated by an overly curious SNP. International Journal of Computational Science and Engineering. 10:3. (281-292). Online publication date: 1-Apr-2015.

    https://doi.org/10.1504/IJCSE.2015.068836

  • (2014). Distributing privacy policies over multimedia content across multiple online social networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 75:PB. (531-543). Online publication date: 24-Dec-2014.

    /doi/10.5555/2949837.2949913

  • González-Manzano L, González-Tablas A, de Fuentes J and Ribagorda A. (2014). CooPeD. Computers and Security. 47:C. (41-65). Online publication date: 1-Nov-2014.

    https://doi.org/10.1016/j.cose.2014.06.003

  • Liu B and Hengartner U. pTwitterRec. Proceedings of the 9th ACM symposium on Information, computer and communications security. (365-376).

    https://doi.org/10.1145/2590296.2590304

  • Backes M, Gerling S, Lorenz S and Lukas S. X-pire 2.0. Proceedings of the 29th Annual ACM Symposium on Applied Computing. (1633-1640).

    https://doi.org/10.1145/2554850.2554856

  • Albertini D and Carminati B. Relationship-based information sharing in cloud-based decentralized social networks. Proceedings of the 4th ACM conference on Data and application security and privacy. (297-304).

    https://doi.org/10.1145/2557547.2557574

  • Maheswaran J, Wolinsky D and Ford B. Crypto-Book. Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. (1-7).

    https://doi.org/10.1145/2535771.2535798

  • Huber M, Mulazzani M, Schrittwieser S and Weippl E. Appinspect. Proceedings of the first ACM conference on Online social networks. (143-154).

    https://doi.org/10.1145/2512938.2512942

  • Raji F, Miri A and Jazi M. (2013). CP2. Computers and Electrical Engineering. 39:7. (2282-2298). Online publication date: 1-Oct-2013.

    https://doi.org/10.1016/j.compeleceng.2012.09.002

  • Conti M, Hasani A and Crispo B. (2013). Virtual private social networks and a facebook implementation. ACM Transactions on the Web. 7:3. (1-31). Online publication date: 1-Sep-2013.

    https://doi.org/10.1145/2516633.2516636

  • Damen S and Zannone N. Privacy Implications of Privacy Settings and Tagging in Facebook. 10th VLDB Workshop on Secure Data Management - Volume 8425. (121-138).

    https://doi.org/10.1007/978-3-319-06811-4_16

  • Vemou K and Karyda M. A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. Proceedings of the 10th International Conference on Trust, Privacy, and Security in Digital Business - Volume 8058. (74-84).

    https://doi.org/10.1007/978-3-642-40343-9_7

  • Viejo A, Castellí-Roca J and Rufián G. Preserving the User's Privacy in Social Networking Sites. Proceedings of the 10th International Conference on Trust, Privacy, and Security in Digital Business - Volume 8058. (62-73).

    https://doi.org/10.1007/978-3-642-40343-9_6

  • Beato F, Ion I, Čapkun S, Preneel B and Langheinrich M. For some eyes only. Proceedings of the third ACM conference on Data and application security and privacy. (1-12).

    https://doi.org/10.1145/2435349.2435351

  • Paske B and Lyle J. Follow you follow me. Proceedings of the Workshop on Multi-device App Middleware. (1-6).

    https://doi.org/10.1145/2405172.2405176

  • Viejo A, SáNchez D and Castellí-Roca J. (2012). Preventing automatic user profiling in Web 2.0 applications. Knowledge-Based Systems. 36. (191-205). Online publication date: 1-Dec-2012.

    https://doi.org/10.1016/j.knosys.2012.07.001

  • Viejo A, Sánchez D and Castellà-Roca J. Using profiling techniques to protect the user's privacy in twitter. Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence. (161-172).

    https://doi.org/10.1007/978-3-642-34620-0_16

  • Schlegel R and Wong D. Private friends on a social networking site operated by an overly curious SNP. Proceedings of the 6th international conference on Network and System Security. (430-444).

    https://doi.org/10.1007/978-3-642-34601-9_33

  • Reimann S and Dürmuth M. Timed revocation of user data. Proceedings of the 2012 ACM workshop on Privacy in the electronic society. (65-74).

    https://doi.org/10.1145/2381966.2381976

  • Egele M, Moser A, Kruegel C and Kirda E. (2012). PoX. Computer Communications. 35:12. (1507-1515). Online publication date: 1-Jul-2012.

    https://doi.org/10.1016/j.comcom.2012.04.016

  • Kontaxis G, Polychronakis M and Markatos E. SudoWeb. Proceedings of the 14th international conference on Information security. (197-212).

    /doi/10.5555/2051002.2051022

  • Munemasa T and Iwaihara M. Trend analysis and recommendation of users' privacy settings on social networking services. Proceedings of the Third international conference on Social informatics. (184-197).

    /doi/10.5555/2050728.2050759

  • Beato F, Kohlweiss M and Wouters K. Scramble! your social network data. Proceedings of the 11th international conference on Privacy enhancing technologies. (211-225).

    /doi/10.5555/2032162.2032174

  • Gayo Avello D. All liaisons are dangerous when all your friends are known to us. Proceedings of the 22nd ACM conference on Hypertext and hypermedia. (171-180).

    https://doi.org/10.1145/1995966.1995991

  • Raji F, Miri A and Davarpanah Jazi M. Preserving privacy in online social networks. Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security. (1-13).

    https://doi.org/10.1007/978-3-642-27901-0_1

  • Jahid S, Mittal P and Borisov N. EASiER. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. (411-415).

    https://doi.org/10.1145/1966913.1966970

  • Conti M, Hasani A and Crispo B. Virtual private social networks. Proceedings of the first ACM conference on Data and application security and privacy. (39-50).

    https://doi.org/10.1145/1943513.1943521

  • Gao H, Hu J, Wilson C, Li Z, Chen Y and Zhao B. Detecting and characterizing social spam campaigns. Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. (35-47).

    https://doi.org/10.1145/1879141.1879147

  • van Cleeff A. A risk management process for consumers. Proceedings of the 2010 New Security Paradigms Workshop. (107-114).

    https://doi.org/10.1145/1900546.1900561

  • Thomas K, Grier C and Nicol D. unfriendly. Proceedings of the 10th international conference on Privacy enhancing technologies. (236-252).

    /doi/10.5555/1881151.1881165

  • Williams J. Social networking applications in health care. Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care. (39-49).

    https://doi.org/10.1145/1809085.1809091