暂无分享,去创建一个
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Jiawei Han,et al. gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[3] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[4] John Scott. What is social network analysis , 2010 .
[5] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[6] Joseph Fiksel,et al. Dynamic evolution in societal networks , 1980 .
[7] Andrew McCallum,et al. Topic and Role Discovery in Social Networks , 2005, IJCAI.
[8] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[9] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[10] Mostafa H. Ammar,et al. On the design and performance of prefix-preserving IP traffic trace anonymization , 2001, IMW '01.
[11] S. Wasserman,et al. Social Network Analysis: Computer Programs , 1994 .
[12] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[13] Johanne Saint-Charles,et al. Different relationships for coping with ambiguity and uncertainty in organizations , 2009, Soc. Networks.
[14] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.