Preserving Privacy in Social Networks Against Neighborhood Attacks
暂无分享,去创建一个
[1] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[2] John Scott. What is social network analysis , 2010 .
[3] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[4] S. Wasserman,et al. Social Network Analysis: Computer Programs , 1994 .
[5] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[6] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[7] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[8] Ronald L. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Jiawei Han,et al. gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[11] Oded Schwartz,et al. On the Complexity of Approximating k-Dimensional Matching , 2003, RANDOM-APPROX.
[12] Philip S. Yu,et al. Graph indexing: a frequent structure-based approach , 2004, SIGMOD '04.
[13] Christos Faloutsos,et al. R-MAT: A Recursive Model for Graph Mining , 2004, SDM.
[14] Lada A. Adamic,et al. How to search a social network , 2005, Soc. Networks.
[15] Lise Getoor,et al. Link mining: a survey , 2005, SKDD.
[16] Jon M. Kleinberg,et al. Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.
[17] Gueorgi Kossinets,et al. Empirical Analysis of an Evolving Social Network , 2006, Science.
[18] Jian Pei,et al. Utility-based anonymization using local recoding , 2006, KDD '06.
[19] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[20] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[21] Tsan-sheng Hsu,et al. Privacy Protection in Social Network Data Disclosure Based on Granular Computing , 2006, 2006 IEEE International Conference on Fuzzy Systems.
[22] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[23] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[24] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[25] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .