Theory and Applications of Models of Computation
暂无分享,去创建一个
[1] Maciej M. SysŁ. The subgraph isomorphism problem for outerplanar graphs , 1982 .
[2] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[3] Teodor C. Przymusinski. An Algorithm to Compute Circumscription , 1989, Artif. Intell..
[4] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[5] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[6] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[7] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[8] Jörg Keller,et al. Period lengths of chaotic pseudo-random number generators , 2007 .
[9] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[10] René Peeters,et al. The maximum edge biclique problem is NP-complete , 2003, Discret. Appl. Math..
[11] Philip S. Yu,et al. Personalized Privacy Protection in Social Networks , 2010, Proc. VLDB Endow..
[12] Jeremy P. Spinrad,et al. Efficient graph representations , 2003, Fields Institute monographs.
[13] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[14] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[15] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[16] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[17] E. S. Wolk. A note on “The comparability graph of a tree” , 1965 .
[18] Philip S. Yu,et al. Protecting Sensitive Labels in Social Network Data Anonymization , 2013, IEEE Transactions on Knowledge and Data Engineering.
[19] Alina Campan,et al. Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.
[20] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[21] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[22] M. de Rijke,et al. Modal Logic , 2001, Cambridge Tracts in Theoretical Computer Science.
[23] Frank Wolter,et al. Handbook of Modal Logic , 2007, Studies in logic and practical reasoning.
[24] Peter Jackson,et al. Computing prime implicates , 1992, CSC '92.
[25] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[26] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.