共 46 条
- [12] BONACICH P, 1987, AM J SOCIOL, V92, P1170, DOI 10.1086/228631
- [13] Bonchi F, 2011, PROC INT CONF DATA, P924, DOI 10.1109/ICDE.2011.5767905
- [14] Campan A, 2009, LECT NOTES COMPUT SC, V5456, P33, DOI 10.1007/978-3-642-01718-6_4
- [15] Cheng J., 2010, P ACM SIGMOD INT C M, P459, DOI DOI 10.1145/1807167.1807218
- [16] Cook S. A., 1971, Proceedings of the 3rd annual ACM symposium on theory of computing, P151
- [17] Anonymizing Bipartite Graph Data using Safe Groupings [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 833 - 844
- [18] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
- [19] Gundecha P., 2011, Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, P511
- [20] Resisting Structural Re-identification in Anonymized Social Networks [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 102 - 114