k-Degree anonymity on directed networks
暂无分享,去创建一个
Michalis Vazirgiannis | Fragkiskos D. Malliaros | Jordi Casas-Roma | Julián Salas | M. Vazirgiannis | Jordi Casas-Roma | Julián Salas
[1] Matthieu Latapy,et al. Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..
[2] Ting Yu,et al. Anonymizing bipartite graph data using safe groupings , 2008, Proc. VLDB Endow..
[3] Ömer Egecioglu,et al. Anonymizing weighted social network graphs , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[4] Jordi Herrera-Joancomartí,et al. k-Degree anonymity and edge selection: improving data utility in large networks , 2017, Knowledge and Information Systems.
[5] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[6] Andrea Lancichinetti,et al. Community detection algorithms: a comparative analysis: invited presentation, extended abstract , 2009, VALUETOOLS.
[7] Kenneth L. Clarkson,et al. Toward Identity Anonymization in Social Networks , 2010, Link Mining.
[8] Xuesong Lu,et al. Fast Identity Anonymization on Graphs , 2012, DEXA.
[9] Lada A. Adamic,et al. The political blogosphere and the 2004 U.S. election: divided they blog , 2005, LinkKDD '05.
[10] Mirco Musolesi,et al. On the k-Anonymization of Time-Varying and Multi-Layer Social Graphs , 2015, ICWSM.
[11] Jordi Casas-Roma,et al. An Evaluation of Edge Modification Techniques for Privacy-Preserving on Graphs , 2015, MDAI.
[12] Vicenç Torra,et al. Anonymizing graphs: measuring quality for clustering , 2014, Knowledge and Information Systems.
[13] Rolf Niedermeier,et al. A Parameterized Algorithmics Framework for Digraph Degree Sequence Completion Problems , 2016, ArXiv.
[14] Fernando Ferri,et al. New forms of social and professional digital relationships: the case of Facebook , 2011, Social Network Analysis and Mining.
[15] Huiru Zheng,et al. Evaluation repeated random walks in community detection of social networks , 2010, 2010 International Conference on Machine Learning and Cybernetics.
[16] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[17] Rolf Niedermeier,et al. A Parameterized Algorithmics Framework for Degree Sequence Completion Problems in Directed Graphs , 2018, Algorithmica.
[18] Gemma C. Garriga,et al. Randomization Techniques for Graphs , 2009, SDM.
[19] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[20] Vicenç Torra,et al. An algorithm for k-degree anonymity on large networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[21] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[22] Sumitra Mukherjee,et al. A Polynomial Algorithm for Optimal Univariate Microaggregation , 2003, IEEE Trans. Knowl. Data Eng..
[23] David Lo,et al. Mining indirect antagonistic communities from social interactions , 2012, Knowledge and Information Systems.
[24] Rolf Niedermeier,et al. A Parameterized Algorithmics Framework for Degree Sequence Completion Problems in Directed Graphs , 2016, IPEC.
[25] Rolf Niedermeier,et al. A refined complexity analysis of degree anonymization in graphs , 2013, Inf. Comput..
[26] Tore Opsahl,et al. Clustering in weighted networks , 2009, Soc. Networks.
[27] Alex Thomo,et al. Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes , 2012, Social Network Analysis and Mining.
[28] Josep Domingo-Ferrer,et al. Practical Data-Oriented Microaggregation for Statistical Disclosure Control , 2002, IEEE Trans. Knowl. Data Eng..
[29] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[30] Julián Salas,et al. Faster Univariate Microaggregation for Power Law Distributions: k-Degree-Anonymity for Big Graphs , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).
[31] L. Takac. DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS , 2012 .
[32] Josep Domingo-Ferrer,et al. Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.
[33] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.
[34] Martin Rosvall,et al. Maps of random walks on complex networks reveal community structure , 2007, Proceedings of the National Academy of Sciences.
[35] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[36] Michael Ley,et al. The DBLP Computer Science Bibliography: Evolution, Research Issues, Perspectives , 2002, SPIRE.
[37] Jie Wang,et al. Privacy Preservation in Social Networks with Sensitive Edge Weights , 2009, SDM.
[38] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[39] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[40] Balachander Krishnamurthy,et al. Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..
[41] Jure Leskovec,et al. Predicting positive and negative links in online social networks , 2010, WWW '10.
[42] Vicenç Torra,et al. Improving the characterization of P-stability for applications in network privacy , 2016, Discret. Appl. Math..
[43] Sepp Hartung,et al. Improved Upper and Lower Bound Heuristics for Degree Anonymization in Social Networks , 2014, SEA.
[44] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.