共 22 条
[1]
Boccaletti S., Latora V., Moreno Y., Et al., Complex networks: structure and dynamics, Physics Reports, 424, 4, pp. 175-308, (2006)
[2]
Wang X.F., Chen G.R., Complex networks: small-world, scale-free and beyond, IEEE Circuits and Systems Magazine, 3, 1, pp. 6-20, (2003)
[3]
Faloutsos M., Faloutsos P., Faloutos C., On power-law relationships of the internet topology, ACM SIGCOMM'99, pp. 251-262, (1999)
[4]
Tong Y.-H., Tao Y.-D., Tang S.-W., Et al., Identity-reserved anonymity in privacy preserving data publishing, Journal of Software, 21, 4, pp. 771-781, (2010)
[5]
Huang M.-F., Ni W.-W., Wang J.-J., Et al., A logarithmic spiral based data perturbation method for clustering, Chinese Journal of Computers, 35, 11, pp. 2275-2282, (2012)
[6]
Zhang X.-J., Meng X.-F., Differential privacy in data publication and analysis, Chinese Journal of Computers, 37, 4, pp. 927-949, (2014)
[7]
Campan A., Truta T.M., Cooper N., P-sensitive K-anonymity with generalization constraints, Transactions on Data Privacy, 3, 2, pp. 65-89, (2010)
[8]
Campan A., Truta T.M., A clustering approach for data and structural anonymity in social networks, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD(PinKDD'08), pp. 33-54, (2008)
[9]
Wang Z.-H., Xu J., Wang W., Et al., Clustering-Based approach for data anonymization, Journal of Software, 21, 4, pp. 680-693, (2010)
[10]
Zhang J., Xie J., Yang J., Et al., A t-closeness privacy model based on sensitive attribute values semantics bucketization, Journal of Computer Research and Development, 51, 1, pp. 126-137, (2014)