A Novel (K, X)-isomorphism Method for Protecting Privacy in Weighted social Network
暂无分享,去创建一个
[1] Alina Campan,et al. Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.
[2] Tinghuai Ma,et al. Detect structural‐connected communities based on BSCHEF in C‐DBLP , 2016, Concurr. Comput. Pract. Exp..
[3] Jari Saramäki,et al. The role of edge weights in social networks: modelling structure and dynamics , 2007, SPIE International Symposium on Fluctuations and Noise.
[4] Jian Shen,et al. $$\varvec{\textit{KDVEM}}$$KDVEM: a $$k$$k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.
[5] Sung-Ryul Kim,et al. An efficient privacy protection in mobility social network services with novel clustering-based anonymization , 2016, EURASIP J. Wirel. Commun. Netw..
[6] Hong Qiao,et al. A Weighted Common Subgraph Matching Algorithm , 2014, ArXiv.
[7] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[8] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[9] A. Praveena,et al. Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .
[10] A. Praveena,et al. Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .
[11] Masayuki Numao,et al. An Efficient Generalized Clustering Method for Achieving K-Anonymization , 2015, 2015 Third International Symposium on Computing and Networking (CANDAR).
[12] J. Hartigan. Direct Clustering of a Data Matrix , 1972 .
[13] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[14] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[15] Alina Campan,et al. Preserving Communities in Anonymized Social Networks , 2015, Trans. Data Priv..
[16] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[17] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[18] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[19] Jordi Herrera-Joancomartí,et al. A survey of graph-modification techniques for privacy-preserving on networks , 2016, Artificial Intelligence Review.
[20] Tinghuai Ma,et al. A novel subgraph K+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$K^{+}$$\end{document}-isomorphism method in social , 2017, Soft Computing.
[21] Julian R. Ullmann,et al. An Algorithm for Subgraph Isomorphism , 1976, J. ACM.
[22] Hong Shen,et al. Anonymizing Graphs Against Weight-Based Attacks , 2010, 2010 IEEE International Conference on Data Mining Workshops.
[23] J. House. Work stress and social support , 1981 .
[24] Tinghuai Ma,et al. KDVEM : a k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.
[25] Sean Chester,et al. Social Network Privacy for Attribute Disclosure Attacks , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[26] Peng Liu,et al. A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks , 2016, QSHINE.
[27] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[28] Yu Wang,et al. A novel efficient algorithm for determining maximum common subgraphs , 2005, Ninth International Conference on Information Visualisation (IV'05).