Asymmetric structure-preserving subgraph queries for large graphs
暂无分享,去创建一个
Jianliang Xu | Sourav S. Bhowmick | Byron Choi | Zhe Fan | Byron Choi | Jianliang Xu | Zhe Fan | S. Bhowmick
[1] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[2] Sofya Raskhodnikova,et al. Private analysis of graph structure , 2011, Proc. VLDB Endow..
[3] Yun Peng,et al. Authenticated Subgraph Similarity Searchin Outsourced Graph Databases , 2015, IEEE Transactions on Knowledge and Data Engineering.
[4] Kyriakos Mouratidis,et al. Shortest Path Computation with No Information Leakage , 2012, Proc. VLDB Endow..
[5] Daniel A. Menascé,et al. QoS Issues in Web Services , 2002, IEEE Internet Comput..
[6] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[7] FoggiaPasquale,et al. A (Sub)Graph Isomorphism Algorithm for Matching Large Graphs , 2004 .
[8] Julian R. Ullmann,et al. An Algorithm for Subgraph Isomorphism , 1976, J. ACM.
[9] Jianliang Xu,et al. Authenticating location-based services without compromising location privacy , 2012, SIGMOD Conference.
[10] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[11] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[12] Jianzhong Li,et al. Efficient Subgraph Matching on Billion Node Graphs , 2012, Proc. VLDB Endow..
[13] Philip S. Yu,et al. Correlated network data publication via differential privacy , 2013, The VLDB Journal.
[14] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[15] Xiaodong Lin,et al. Reachability Analysis in Privacy-Preserving Perturbed Graphs , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[16] Jianliang Xu,et al. Privacy-Preserving Reachability Query Services , 2014, DASFAA.
[17] Shuigeng Zhou,et al. QUBLE: towards blending interactive visual subgraph search queries on large networks , 2014, The VLDB Journal.
[18] Yun Peng,et al. Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases , 2014, IEEE Transactions on Services Computing.
[19] Jeong-Hoon Lee,et al. Turboiso: towards ultrafast and robust subgraph isomorphism search in large graph databases , 2013, SIGMOD '13.
[20] Lei Zou,et al. A novel spectral coding in a large graph database , 2008, EDBT '08.
[21] Yinghui Wu,et al. Ontology-based subgraph querying , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[22] LiJianzhong,et al. Efficient subgraph matching on billion node graphs , 2012, VLDB 2012.
[23] Elisa Bertino,et al. Efficient Leakage-free Authentication of Trees, Graphs and Forests , 2012, IACR Cryptol. ePrint Arch..
[24] Elisa Bertino,et al. Efficient tree pattern queries on encrypted XML documents , 2013, EDBT '13.
[25] Mario Vento,et al. A (sub)graph isomorphism algorithm for matching large graphs , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[26] Philip S. Yu,et al. Graph indexing: a frequent structure-based approach , 2004, SIGMOD '04.
[27] Cong Wang,et al. Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[28] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[29] Jeffrey Xu Yu,et al. Taming verification hardness: an efficient algorithm for testing subgraph isomorphism , 2008, Proc. VLDB Endow..
[30] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[31] Pablo Barceló,et al. Querying graph patterns , 2011, PODS.
[32] Yinghui Wu,et al. Schemaless and Structureless Graph Querying , 2014, Proc. VLDB Endow..
[33] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[34] Jeffrey Xu Yu,et al. Neighborhood-privacy protected shortest distance computing in cloud , 2011, SIGMOD '11.