共 46 条
[12]
BONACICH P, 1987, AM J SOCIOL, V92, P1170, DOI 10.1086/228631
[13]
Bonchi F, 2011, PROC INT CONF DATA, P924, DOI 10.1109/ICDE.2011.5767905
[14]
Campan A, 2009, LECT NOTES COMPUT SC, V5456, P33, DOI 10.1007/978-3-642-01718-6_4
[15]
Cheng J., 2010, P ACM SIGMOD INT C M, P459, DOI DOI 10.1145/1807167.1807218
[16]
Cook S. A., 1971, Proceedings of the 3rd annual ACM symposium on theory of computing, P151
[17]
Anonymizing Bipartite Graph Data using Safe Groupings
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2008, 1 (01)
:833-844
[18]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[19]
Gundecha P., 2011, Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, P511
[20]
Resisting Structural Re-identification in Anonymized Social Networks
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2008, 1 (01)
:102-114