[1] 刘向宇,王斌,杨晓春.社会网络数据发布隐私保护技术综述[J].软件学报,2014,25(3):576-590.(LIU X Y, WANG B, YANG X C. Survey on privacy preserving techniques for publishing social network data [J]. Journal of software, 2014, 25(3):576-590.) [2] SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression [J]. International journal of uncertainty, fuzziness and knowledge-based systems, 2002, 10(5): 571-588. [3] LIU X, YANG X. Protecting sensitive relationships against infer-ence attacks in social networks [C]// DASFAA 2012: Proceedings of the 17th International Conference on Database Systems for Advanced Applications. Berlin: Springer, 2012: 335-350. [4] HAY M, JENSEN D, SRIVASTAVA S, et al. Anonymizing social networks [C]// VLDB 2007: Proceedings of the 34nd International Conference on Very Large Databases. [S.l.]: VLDB Endowment, 2007: 173-187. [5] LIU K, TERZI E. Towards identity anonymization on graphs [C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2008: 93-106. [6] ZHOU B, PEI J. Preserving privacy in social networks against neighborhood attacks [C]// ICDE 2008: Proceedings of the 24th International Conference on Data Engineering. Piscataway, NJ: IEEE, 2008: 506-515. [7] LI N, LI T, VENKATASUBRAMANIAN S. t-Closeness: privacy beyond k-anonymity and l-diversity [C]// ICDE 2007: Proceedings of the 23rd International Conference on Data Engineering. Piscataway, NJ: IEEE, 2007: 106-115. [8] YING X, WU X. Randomizing social networks: a spectrum preserving approach [C]// SDM 2008: Proceedings of the 2008 SIAM International Conference on Data Mining. Philadelphia, PA: SIAM, 2008: 739-750. [9] ZHELEVA E, GETOOR L. Preserving the privacy of sensitive relationships in graph data [C]// PinKDD 2007: Proceedings of the 1st ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD. Berlin: Springer, 2008: 153-171. [10] CHENG J, FU A W, LIU J. K-isomorphism: privacy preserving network publication against structural attacks [C]// SIGMOD'10: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2010: 459-470. [11] CORMODE G, SRIVASTAVA D, YU T, et al. Anonymizing bipartite graph data using safe groupings [C]// VLDB 2008: Proceedings of the 34th International Conference on Very Large Databases. [S.l.]: VLDB Endowment, 2008: 833-844. [12] HAY M, MIKLAU G, JENSEN D, et al. Resisting structural re-identification in anonymized social networks [J]. Proceedings of the VLDB endowment, 2008, 1(1): 102-114. [13] SWEENEY L. k-anonmity: a model for protecting privacy [J]. International journal of uncertainty fuzziness and knowledge based systems, 2002, 10(5): 557-570. [14] 付艳艳,张敏,冯登国,等.基于节点分割的社交网络属性隐私保护[J].软件学报,2014,25(4):768-780.(FU Y Y, ZHANG M, FENG D G, et al. Attribute privacy preservation in social networks based on node anatomy [J]. Journal of software, 2014, 25(4): 768-780.) [15] 刘华玲,郑建国,孙辞海.基于贪心扰动的社交网络隐私保护研究[J].电子学报,2013,41(8):1586-1591.(LIU H L, ZHENG J G, SUN C H. Privacy preserving in social networks based on greedy perturbation [J]. Acta electronica sinica, 2013, 41(8): 1586-1591.) [16] BHAGAT S, CORMODE G, KRISHNAMURTHY B, et al. Class-based graph anonymization for social network data [J]. Proceedings of the VLDB endowment, 2009, 2(1): 766-777. [17] ZHANG C, SUN J, ZHU X, et al. Privacy and security for online social networks: challenges and opportunities [J]. IEEE network, 2010, 24(4): 13-18. [18] MITTAL P, PAPAMANTHOU C, SONG D. Preserving link privacy in social network based systems [C/OL]. NDSS 2013: 20th Annual Network and Distributed System Security Symposium, San Diego, California, USA, February 24-27, 2013. [2015-08-04]. https://www.princeton.edu/~pmittal/publications/link-privacy-ndss13.pdf. |