Privacy preserving social networking
暂无分享,去创建一个
[1] Juan José SALAZAR-GONZÁLEZ,et al. Statistical Confidentiality: Principles and Practice , 2011 .
[2] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[3] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[4] Nick Koudas,et al. Efficient sampling of information in social networks , 2008, SSM '08.
[5] John Scott. What is social network analysis , 2010 .
[6] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[7] Christos Faloutsos,et al. Scalable modeling of real graphs using Kronecker multiplication , 2007, ICML '07.
[8] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[9] Yiran Chen,et al. Quantitative Study of Individual Emotional States in Social Networks , 2012, IEEE Transactions on Affective Computing.
[10] Philip S. Yu,et al. Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.
[11] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] B. K. Tripathy,et al. A New Approach to Manage Security against Neighborhood Attacks in Social Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[13] Xindong Wu,et al. 10 Challenging Problems in Data Mining Research , 2006, Int. J. Inf. Technol. Decis. Mak..
[14] Qiang Yang,et al. Three challenges in data mining , 2010, Frontiers of Computer Science in China.
[15] Stanley Milgram,et al. An Experimental Study of the Small World Problem , 1969 .
[16] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[17] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.
[18] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.
[19] Jimeng Sun,et al. Social influence analysis in large-scale networks , 2009, KDD.
[20] Barbara Carminati,et al. Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[21] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[22] Xiaowei Ying,et al. Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.
[23] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[24] Philip S. Yu,et al. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques , 2010 .
[25] Charu C. Aggarwal,et al. Managing and Mining Graph Data , 2010, Managing and Mining Graph Data.
[26] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[27] Na Li,et al. Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.