[1] |
HEIDARI S, SIMMHAN Y, CALHEIROS R N, et al. Scalable Graph Processing Frameworks:A Taxonomy and Open Challenges[J]. ACM Computing Surveys, 2018, 51(3):1-53.
|
[2] |
BACKSTROM L, DWORK C, KLEINBERG J. Wherefore Art Thou R3579X?:Anonymized Social Networks,Hidden Patterns,and Structural Steganography[C]// The 16th International Conference on World Wide Web. New York: ACM, 2007:181-190.
|
[3] |
刘宇涵, 陈红, 刘艺璇, 等. 图数据上的隐私攻击与防御技术[J]. 计算机学报, 2022, 45(4):702-734.
|
|
LIU Yuhan, CHEN Hong, LIU Yixuan, et al. Privacy Attack and Defense Technology on Graph Data[J]. Journal of Computer Science, 2022, 45 (4):702-734.
|
[4] |
KAUR H, HOODA N, SINGH H. k-Anonymization of Social Network Data using Neural Network and SVM:K-NeuroSVM[J]. Journal of Information Security and Applications, 2023, 72:103382.
doi: 10.1016/j.jisa.2022.103382
|
[5] |
GAO J R, CHEN W, XU JJ, et al. An Efficient Framework for Multiple Subgraph Pattern Matching Models[J]. Journal of Computer Science and Technology, 2019, 34:1185-1202.
doi: 10.1007/s11390-019-1969-x
|
[6] |
GAO T, LI F. Privacy-Preserving Sketching for Online Social Network Data Publication[C]// 2019 16th Annual IEEE International Conference on Sensing,Communication,and Networking (SECON).Piscataway:IEEE, 2019:1-9.
|
[7] |
DWORK C. Differential Privacy[C]// International Colloquium on Automata,Languages,and Programming,Berlin:Springer, 2006:1-12.
|
[8] |
徐花, 田有亮. 差分隐私下的权重社交网络隐私保护[J]. 西安电子科技大学学报, 2022, 49(1):17-25.
|
|
XU Hua, TIANYouliang. Protection of Privacy of the Weighted Social Network Under Differential Privacy[J]. Journal of Xidian University, 2022, 49(1):17-25.
|
[9] |
ZHAO Y, CHEN J. A Survey on Differential Privacy for Unstructured Data Content[J]. ACM Computing Surveys, 2022, 54(10s):1-28.
|
[10] |
CAI T T, WANG Y, ZHANG L. The Cost of Privacy:Optimal Rates of Convergence for Parameter Estimation with Differential Privacy[J]. The Annals of Statistics, 2021, 49(5):2825-2850.
|
[11] |
JIANG H, PEI J, YU D, et al. Applications of Differential Privacy in Social Network Analysis:A survey[J]. IEEE Transactions on Knowledge and Data Engineering, 2021, 35(1):108-127.
|
[12] |
HAY M, MIKLAU G, JENSEN D, et al. Resisting Structural Re-Identification in Anonymized Social Networks[J]. The VLDB Journal, 2010, 19(6):797-823.
doi: 10.1007/s00778-010-0210-x
|
[13] |
LIU K, TERZI E. Towards Identity Anonymization on Graphs[C]// The 2008 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2008:93-106.
|
[14] |
YAZDANJUE N, FATHIAN M, AMIRI B. Evolutionary Algorithms fork-Anonymity in Social Networks Based on Clustering Approach[J]. The Computer Journal, 2020, 63(7):1039-1062.
doi: 10.1093/comjnl/bxz069
|
[15] |
LANGARI R K, SARDAR S, MOUSAVI S A A, et al. Combined Fuzzy Clustering and Firefly Algorithm for Privacy Preserving in Social Networks[J]. Expert Systems with Applications, 2020, 141:112968.
doi: 10.1016/j.eswa.2019.112968
|
[16] |
HONG L, XIAO R. Towards Publishing Directed Social Network Data with k-Degree Anonymization[J]. Concurrency and Computation:Practice and Experience, 2022, 34(24):e7226.
doi: 10.1002/cpe.v34.24
|
[17] |
LIU P, LI X. An Improved Privacy Preserving Algorithm for Publishing Social Network Data[C]// 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.Piscataway:IEEE, 2013:888-895.
|
[18] |
BAZGAN C, CAZALS P, CHLEBÍKOVÁ J. Degree-Anonymization Using Edge Rotations[J]. Theoretical Computer Science, 2021, 873:1-15.
doi: 10.1016/j.tcs.2021.04.020
|
[19] |
ZHOU B, PEI J. Preserving Privacy in Social Networks Against Neighborhood Attacks[C]// 2008 IEEE 24th International Conference on Data Engineering.Piscataway:IEEE, 2008:506-515.
|
[20] |
CHENG J, FU A W, LIU J. k-Isomorphism:Privacy Preserving Network Publication Against Structural Attacks[C]// The 2010 ACM SIGMOD International Conference on Management of data. New York: ACM 2010:459-470.
|
[21] |
ZOU L, CHEN L, ÖZSU M T. k-automorphism:A General Framework for Privacy Preserving Network Publication[J]. Proceedings of the VLDB Endowment, 2009, 2(1):946-957.
doi: 10.14778/1687627.1687734
|
[22] |
OUAFAE B, MARIAM R, OUMAIMA L, et al. Data Anonymization in Social Networks (2020)[J/OL].[2022-01-04]. https://easychair.org/publications/preprint_download/dfvj.
|
[23] |
LIU A X, LI R. Publishing Social Network Data with Privacy Guarantees[M]. Algorithms for Data and Computation Privacy.Heidelberg:Springer, 2021:279-311.
|
[24] |
LIANG Y, SAMAVI R. Optimization-Based k-Anonymity Algorithms[J]. Computers & Security, 2020, 93:101753.
doi: 10.1016/j.cose.2020.101753
|
[25] |
SHAKEEL S, ANJUM A, ASHERALIEVA A, et al. k-NDDP:An Efficient Anonymization Model for Social Network Data Release[J]. Electronics, 2021, 10(19):2440.
doi: 10.3390/electronics10192440
|
[26] |
KIABOD M, DEHKORDI M N, BAREKATAIN B. TSRAM:A Time-Savingk-Degree Anonymization Method in Social Network[J]. Expert Systems with Applications, 2019, 125:378-396.
doi: 10.1016/j.eswa.2019.01.059
|
[27] |
KIABOD M, DEHKORDI M N, BAREKATAIN B. A Fast Graph Modification Method for Social Network Anonymization[J]. Expert Systems with Applications, 2021, 180:115-148.
|
[28] |
CASAS-ROMA J, HERRERA-JOANCOMARTÍ J, TORRA V. k-Degree Anonymity and Edge Selection:Improving Data Utility in Large Networks[J]. Knowledge and Information Systems, 2017, 50(2):447-474.
doi: 10.1007/s10115-016-0947-7
|
[29] |
CASAS-ROMA J, SALAS J, MALLIAROS F D, et al. k-Degree Anonymity on Directed Networks[J]. Knowledge and Information Systems, 2019, 61(3):1743-1768.
doi: 10.1007/s10115-018-1251-5
|