GraphProtector: A Visual Interface for Employing and Assessing Multiple Privacy Preserving Graph Algorithms
暂无分享,去创建一个
Kwan-Liu Ma | Wenlong Chen | Wei Chen | Chris Bryan | Jia-Kai Chou | Huihua Guan | Xu-Meng Wang | Rusheng Pan | K. Ma | Chris Bryan | Rusheng Pan | Xumeng Wang | Jia-Kai Chou | Huihua Guan | Wei Chen | Wenlong Chen
[1] Neil J. Hurley,et al. Visualization of trends in subscriber attributes of communities on mobile telecommunications networks , 2014, Social Network Analysis and Mining.
[2] Fangzhao Wu,et al. OpinionFlow: Visual Analysis of Opinion Diffusion on Social Media , 2014, IEEE Transactions on Visualization and Computer Graphics.
[3] Minas Gjoka,et al. Construction of simple graphs with a target joint degree matrix and beyond , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[4] Robert Kosara,et al. Adaptive Privacy-Preserving Visualization Using Parallel Coordinates , 2011, IEEE Transactions on Visualization and Computer Graphics.
[5] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[6] Qian Xiao,et al. Differentially private network data release via structural inference , 2014, KDD.
[7] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[8] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[9] Helwig Hauser,et al. Curve Density Estimates , 2011, Comput. Graph. Forum.
[10] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[11] Arjan Kuijper,et al. Visual Analysis of Large Graphs: State‐of‐the‐Art and Future Research Challenges , 2011, Eurographics.
[12] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[13] Jan Westerholm,et al. Methods for deriving and calibrating privacy-preserving heat maps from mobile sports tracking application data , 2015 .
[14] Yang Wang,et al. Privacy preserving event sequence data visualization using a Sankey diagram-like representation , 2016, SIGGRAPH Asia Symposium on Visualization.
[15] Daniel A. Keim,et al. Visual Analytics: Definition, Process, and Challenges , 2008, Information Visualization.
[16] Danai Koutra,et al. RolX: structural role extraction & mining in large graphs , 2012, KDD.
[17] Silvio Lattanzi,et al. An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..
[18] Yingcai Wu,et al. A Survey of Visual Analytics Techniques and Applications: State-of-the-Art Research and Future Challenges , 2013, Journal of Computer Science and Technology.
[19] Jure Leskovec,et al. Overlapping community detection at scale: a nonnegative matrix factorization approach , 2013, WSDM.
[20] Michael Boss,et al. Network topology of the interbank market , 2003, cond-mat/0309582.
[21] Kwan-Liu Ma,et al. A Utility-Aware Visual Approach for Anonymizing Multi-Attribute Tabular Data , 2018, IEEE Transactions on Visualization and Computer Graphics.
[22] Kwan-Liu Ma,et al. Privacy preserving visualization for social network data with ontology information , 2017, 2017 IEEE Pacific Visualization Symposium (PacificVis).
[23] Xintao Wu,et al. Preserving Differential Privacy in Degree-Correlation based Graph Generation , 2013, Trans. Data Priv..
[24] Shouling Ji,et al. Structure Based Data De-Anonymization of Social Networks and Mobility Traces , 2014, ISC.
[25] Dorothea Wagner,et al. Approximating Clustering Coefficient and Transitivity , 2005, J. Graph Algorithms Appl..
[26] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[27] Yong-Yeol Ahn,et al. Community-Enhanced De-anonymization of Online Social Networks , 2014, CCS.
[28] Mengchen Liu,et al. A survey on information visualization: recent advances and challenges , 2014, The Visual Computer.
[29] Danfeng Yao,et al. The union-split algorithm and cluster-based anonymization of social networks , 2009, ASIACCS '09.
[30] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[31] Paul Erdös,et al. How to Define an Irregular Graph , 1988 .
[32] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[33] Ravi Shankar Singh,et al. Error-tolerant graph matching using homeomorphism , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[34] Jie Wu,et al. Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.
[35] Prateek Mittal,et al. SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization , 2015, USENIX Security Symposium.
[36] Alessia Saggese,et al. Challenging the Time Complexity of Exact Subgraph Isomorphism for Huge and Dense Graphs with VF3 , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[37] Manuel Graña,et al. Semantically enhanced network analysis for influencer identification in online social networks , 2017, Neurocomputing.
[38] Walter Didimo,et al. An advanced network visualization system for financial crime detection , 2011, 2011 IEEE Pacific Visualization Symposium.
[39] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[40] Lei Chen,et al. A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.
[41] K. Möller,et al. Business Relationships and Networks: Managerial Challenge of Network Era , 1999 .
[42] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[43] Shlomo Havlin,et al. The structural role of weak and strong links in a financial market network , 2008, 0805.2477.
[44] Stanford,et al. Learning to Discover Social Circles in Ego Networks , 2012 .
[45] Qiuju Luo,et al. Using social network analysis to explain communication characteristics of travel-related electronic word-of-mouth on social networking sites. , 2015 .
[46] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[47] P. Bonacich. Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.
[48] Ben Y. Zhao,et al. Sharing graphs using differentially private graph models , 2011, IMC '11.
[49] R. Burt. Structural Holes and Good Ideas1 , 2004, American Journal of Sociology.
[50] 謝楠楨. An integrated data mining and behavioral scoring model for analyzing bank customers , 2004 .
[51] A. Gibbons. Algorithmic Graph Theory , 1985 .
[52] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[53] D. W. Scott,et al. Multivariate Density Estimation, Theory, Practice and Visualization , 1992 .
[54] Mario Vento,et al. A (sub)graph isomorphism algorithm for matching large graphs , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.