[1] CHESTER S, KAPRON B, RAMESH G, et al. K-anonymization of social networks by vertex addition [C]//ADBIS 2012: Proceedings of the 2012 Advances in Databases and Information Systems. Berlin: Springer, 2012: 107-116. [2] CHESTER S, GAERTNER J, STEGE U, et al. Anonymizing subsets of social networks with degree constrained subgraphs [C]//Proceedings of the 2012 ACM International Conference on Advances in Social Networks Analysis and Mining. New York: ACM, 2012: 418-422. [3] TAI C-H, YU P S, YANG D-N, et al. Privacy-preserving social network publication against friendship attacks [C]//KDD'11: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2011: 1262-1270. [4] YANG J, LIU X, YANG X. Automorphism based K-secure for privacy preserving in social networks [C]//NDBC 2012: Proceedings of the Academic Conference on the 29th China Database: B. Beijing: Science Press, 2012: 264-271. (杨俊,刘向宇,杨晓春.基于图自同构的K-Secure 社会网络隐私保护方法[C]//第29届中国数据库学术会议论文集:B辑.北京:科学出版社,2012:264-271. [5] SUN C, YU P S, KONG X, et al. Privacy preserving social network publication against mutual friend attacks [C]//ICDMW 2013: Proceedings of the IEEE 13th International Conference on Data Mining Workshops. Washington, DC: IEEE Computer Society, 2013: 883-890. [6] YUAN M X, CHEN L, YU P S, et al. Protecting sensitive labels in social network data anonymization [J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(3):633-647. [7] LI J, HAN J. A Privacy-preserving method for social networks with sensitive relationship — a (k,l)-anonymity model [J]. Journal of Chinese Computer Systems, 2013, 34(5): 1003-1008. (李静,韩建民.一种含敏感关系社会网络隐私保护方法——(k,l)-匿名模型[J].小型微型计算机系统,2013,34(5):1003-1008.) [8] ZHOU B, PEI J. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks[J]. Knowledge and Information Systems, 2011, 28(1): 47-77. [9] CHESTER S, KAPRON B M, SRIVASTAVA G, et al. Complexity of social network anonymization [J]. Social Network Analysis and Mining, 2013, 3(2):151-166. [10] XU Y, QIN X, YANG Y, et al. A QI weight-aware approach to privacy preserving publishing data set[J]. Journal of Computer Research and Development, 2012, 49(5): 913-924. (徐勇,秦小麟,杨一涛,等.一种考虑属性权重的隐私保护数据发布方法[J].计算机研究与发展,2012,49(5):913-924.) [11] LI N H, LI T C, VENKATASUBRAMANIAN S. t-closeness: privacy beyond k-anonymity and l-diversity [C]//ICDE'07: Proceedings of the IEEE 23rd International Conference on Data Engineering. Piscataway: IEEE, 2007: 106-115. [12] HAY M, MIKLAU G, JENSEN D, et al. Resisting structural re-identification in anonymized social networks [J]. The International Journal on Very Large Data Bases, 2008, 19(6): 797-823. [13] YUAN M, CHEN L, YU P S. Personalized privacy protection in social networks [J]. Proceedings of the VLDB Endowment, 2010, 4(2): 141-150. |