Neighborhood-privacy protected shortest distance computing in cloud
暂无分享,去创建一个
Jeffrey Xu Yu | Jun Gao | Ruoming Jin | Tengjiao Wang | Dongqing Yang | Jiashuai Zhou | R. Jin | J. Yu | Jun Gao | Dongqing Yang | Tengjiao Wang | Jiashuai Zhou
[1] Andrew McGregor,et al. Optimizing linear counting queries under differential privacy , 2009, PODS.
[2] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[3] Lei Zou,et al. DistanceJoin: Pattern Match Query In a Large Graph Database , 2009, Proc. VLDB Endow..
[4] Balachander Krishnamurthy,et al. Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..
[5] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[6] Elke A. Rundensteiner,et al. Hierarchical Encoded Path Views for Path Query Processing: An Optimal Model and Its Performance Evaluation , 1998, IEEE Trans. Knowl. Data Eng..
[7] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[8] Aristides Gionis,et al. Fast shortest path distance estimation in large networks , 2009, CIKM.
[9] Daniel J. Abadi,et al. Data Management in the Cloud: Limitations and Opportunities , 2009, IEEE Data Eng. Bull..
[10] Andrew V. Goldberg,et al. Computing the shortest path: A search meets graph theory , 2005, SODA '05.
[11] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[12] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[13] Sakti Pramanik,et al. An Efficient Path Computation Model for Hierarchically Structured Topographical Road Maps , 2002, IEEE Trans. Knowl. Data Eng..
[14] Kyriakos Mouratidis,et al. Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[15] Jie Wang,et al. Privacy Preservation in Social Networks with Sensitive Edge Weights , 2009, SDM.
[16] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[17] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.
[18] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[19] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[20] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[21] Ting Yu,et al. Anonymizing bipartite graph data using safe groupings , 2008, Proc. VLDB Endow..
[22] Ömer Egecioglu,et al. Anonymizing weighted social network graphs , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[23] Edith Cohen,et al. Reachability and distance queries via 2-hop labels , 2002, SODA '02.
[24] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[25] Mikkel Thorup,et al. Approximate distance oracles , 2001, JACM.
[26] Suman Nath,et al. Secure outsourced aggregation via one-way chains , 2009, SIGMOD Conference.
[27] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[28] Jon M. Kleinberg,et al. Triangulation and embedding using small sets of beacons , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[29] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.