共 22 条
- [1] Boccaletti S., Latora V., Moreno Y., Et al., Complex networks: structure and dynamics, Physics Reports, 424, 4, pp. 175-308, (2006)
- [2] Wang X.F., Chen G.R., Complex networks: small-world, scale-free and beyond, IEEE Circuits and Systems Magazine, 3, 1, pp. 6-20, (2003)
- [3] Faloutsos M., Faloutsos P., Faloutos C., On power-law relationships of the internet topology, ACM SIGCOMM'99, pp. 251-262, (1999)
- [4] Tong Y.-H., Tao Y.-D., Tang S.-W., Et al., Identity-reserved anonymity in privacy preserving data publishing, Journal of Software, 21, 4, pp. 771-781, (2010)
- [5] Huang M.-F., Ni W.-W., Wang J.-J., Et al., A logarithmic spiral based data perturbation method for clustering, Chinese Journal of Computers, 35, 11, pp. 2275-2282, (2012)
- [6] Zhang X.-J., Meng X.-F., Differential privacy in data publication and analysis, Chinese Journal of Computers, 37, 4, pp. 927-949, (2014)
- [7] Campan A., Truta T.M., Cooper N., P-sensitive K-anonymity with generalization constraints, Transactions on Data Privacy, 3, 2, pp. 65-89, (2010)
- [8] Campan A., Truta T.M., A clustering approach for data and structural anonymity in social networks, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD(PinKDD'08), pp. 33-54, (2008)
- [9] Wang Z.-H., Xu J., Wang W., Et al., Clustering-Based approach for data anonymization, Journal of Software, 21, 4, pp. 680-693, (2010)
- [10] Zhang J., Xie J., Yang J., Et al., A t-closeness privacy model based on sensitive attribute values semantics bucketization, Journal of Computer Research and Development, 51, 1, pp. 126-137, (2014)