暂无分享,去创建一个
Dan Li | Jun Wang | Shubo Liu | Yongkai Li | Yongkai Li | Shubo Liu | Jun Wang | Dan Li
[1] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[2] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[3] Aaron Roth,et al. Beating randomized response on incoherent matrices , 2011, STOC '12.
[4] Qian Xiao,et al. Differentially private network data release via structural inference , 2014, KDD.
[5] Philip S. Yu,et al. Personalized Privacy Protection in Social Networks , 2010, Proc. VLDB Endow..
[6] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[7] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[8] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[9] Sofya Raskhodnikova,et al. Analyzing Graphs with Node Differential Privacy , 2013, TCC.
[10] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[11] ChenLei,et al. Personalized privacy protection in social networks , 2010, VLDB 2010.
[12] Ting Yu,et al. Mining frequent graph patterns with differential privacy , 2013, KDD.
[13] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[14] Stavros Papadopoulos,et al. Differentially Private Event Sequences over Infinite Streams , 2014, Proc. VLDB Endow..
[15] Prateek Mittal,et al. LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships , 2016, NDSS.
[16] Ting Yu,et al. Conservative or liberal? Personalized differential privacy , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[17] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[18] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[19] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[20] Yazhe Wang,et al. Preserving privacy in social networks against connection fingerprint attacks , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[21] KleinbergJon,et al. Wherefore art thou R3579X , 2011 .
[22] Ben Y. Zhao,et al. Sharing graphs using differentially private graph models , 2011, IMC '11.
[23] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[24] Dawn Xiaodong Song,et al. Preserving Link Privacy in Social Network Based Systems , 2012, NDSS.
[25] Philip S. Yu,et al. Correlated network data publication via differential privacy , 2013, The VLDB Journal.
[26] Horst Bunke,et al. On a relation between graph edit distance and maximum common subgraph , 1997, Pattern Recognit. Lett..
[27] David Sands,et al. Differential Privacy , 2015, POPL.
[28] Divesh Srivastava,et al. Private Release of Graph Statistics using Ladder Functions , 2015, SIGMOD Conference.
[29] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[30] Sharon Goldberg,et al. Calibrating Data to Sensitivity in Private Data Analysis , 2012, Proc. VLDB Endow..