Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis
暂无分享,去创建一个
[1] Rebecca N. Wright,et al. A Differentially Private Graph Estimator , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[2] Sofya Raskhodnikova,et al. Private analysis of graph structure , 2011, Proc. VLDB Endow..
[3] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[4] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[5] Lei Chen,et al. A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.
[6] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[7] Václav Nýdl,et al. Graph reconstruction from subgraphs , 2001, Discret. Math..
[8] Mason A. Porter,et al. Social Structure of Facebook Networks , 2011, ArXiv.
[9] S. Ulam. A collection of mathematical problems , 1960 .
[10] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Balachander Krishnamurthy,et al. Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..
[12] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[13] Daniel Jackoway. Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural , 2014 .
[14] Aristides Gionis,et al. Mining Large Networks with Subgraph Counting , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[15] Cynthia Dwork,et al. Differential Privacy for Statistics: What we Know and What we Want to Learn , 2010, J. Priv. Confidentiality.
[16] Mason A. Porter,et al. Comparing Community Structure to Characteristics in Online Collegiate Social Networks , 2008, SIAM Rev..
[17] Dan Suciu,et al. Boosting the accuracy of differentially private histograms through consistency , 2009, Proc. VLDB Endow..
[18] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.
[19] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[20] Hillol Kargupta,et al. Privacy-Preserving Data Analysis on Graphs and Social Networks , 2008, Next Generation of Data Mining.
[21] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[22] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[23] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[24] Noga Alon,et al. Finding and counting given length cycles , 1997, Algorithmica.
[25] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[26] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[27] Dan Suciu,et al. Relationship privacy: output perturbation for queries with joins , 2009, PODS.
[28] Lei Zou,et al. DistanceJoin: Pattern Match Query In a Large Graph Database , 2009, Proc. VLDB Endow..
[29] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[30] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.