共 29 条
[1]
Liu K., Terzi E., Towards identity anonymization on graphs, Proc. of the 2008 ACM SIGMOD Int'l Conf. on Management of Data, pp. 93-106, (2008)
[2]
Zhou B., Pei J., Preserving privacy in social networks against neighborhood attacks, Proc. of the 24th IEEE Int'l Conf. on Data Engineering, pp. 506-515, (2008)
[3]
Hay M., Miklau G., Jensen D., Towsley D., Resisting structural identification in anonymized social networks, Proc. of the 34th Int'l Conf. on Very Large Databases, pp. 102-114, (2008)
[4]
Zou L., Chen L., Ozsu M.T., K-Automorphism: A general framework for privacy preserving network publication, Proc. of the 35th Int'l Conf. on Very Large Databases, pp. 946-957, (2009)
[5]
Cormode G., Srivastava D., Yu T., Zhang Q., Anonymizing bipartite graph data using safe groupings, Proc. of the 34th Int'l Conf. on Very Large Databases, pp. 833-844, (2008)
[6]
Bhagat S., Cormode G., Krishnamurthy B., Srivastava D., Class-Based graph anonymization for social network data, Proc. of the 35th Int'l Conf. on Very Large Databases, pp. 766-777, (2009)
[7]
Fard A.M., Wang K., Yu P.S., Limiting link disclosure in social network analysis through subgraph-wise perturbation, Proc. of the 15th Int'l Conf. on Extending Database Technology, pp. 109-119, (2012)
[8]
Gao J., Xu J.Y., Jin R., Zhou J., Wang T., Yang D., Neighborhood-Privacy protected shortest distance computing in cloud, Proc. of the 2011 ACM SIGMOD Int'l Conf. on Management of Data, pp. 409-420, (2011)
[9]
Wang Y., Zheng B., Preserving privacy in social networks against connection fingerprint attacks, Proc. of the 2015 IEEE Int'l Conf. on Data Engineering, pp. 54-65, (2015)
[10]
Cheng J., Fu A.W.C., Liu J., K-Isomorphism: Privacy preserving network publication against structural attacks, Proc. of the 2010 ACM SIGMOD Int'l Conf. on Management of Data, pp. 459-470, (2010)