共 46 条
- [1] Zhao G, Wang QG, Yao F, Et al., A survey of large-scale graph neural network systems, Ruan Jian Xue Bao/Journal of Software, 33, 1, pp. 150-170, (2022)
- [2] Abawajy JH, Ninggal MIH, Herawan T., Privacy preserving social network data publication, IEEE Communications Surveys and Tutorials, 18, 3, pp. 1974-1997, (2016)
- [3] Li XY, Zhang CH, Jung T, Et al., Graph-based privacy preserving data publication, Proc. of the 35th Annual IEEE Int’l Conf. on Computer Communications (INFOCOM 2016), pp. 1-9, (2016)
- [4] Dwork C., The differential privacy frontier, Proc. of the Theory of Cryptography Conf, pp. 496-502, (2009)
- [5] Hay M, Li C, Miklau G, Et al., Accurate estimation of the degree distribution of private networks, Proc. of the 9th IEEE Int’l Conf. on Data Mining, pp. 169-178, (2009)
- [6] Esponda F., Everything that is not important: Negative databases, IEEE Computational Intelligence Magazine, 3, 2, pp. 60-63, (2008)
- [7] Esponda F, Forrest S, Helman P., Enhancing privacy through negative representations of data, pp. 72-84, (2004)
- [8] Dasgupta D, Saha S., Password security through negative filtering, Proc. of the 2010 Int’l Conf. on Emerging Security Technologies, pp. 83-89, (2010)
- [9] Zhao DD, Luo WJ, Liu R, Et al., Negative iris recognition, IEEE Trans. on Dependable and Secure Computing, 15, 1, pp. 112-125, (2015)
- [10] Zhao DD, Luo WJ., Real-Valued negative databases, Proc. of the Artificial Life Conf, pp. 884-890, (2013)