[1] |
姚瑞欣, 李晖, 曹进 . 社交网络中的隐私保护研究综述[J]. 网络与信息安全学报, 2016,2(4): 33-43.
|
|
YAO R X , LI H , CAO J . Overview of privacy preserving in social network[J]. Chinese Journal of Network and Information Security, 2016,2(4): 33-43.
|
[2] |
ZHOU F , LIU L . DeepLink:a deep learning approach for user identity linkage[C]// IEEE International Conference on Computer Communications. 2018: 1313-1321.
|
[3] |
LIU L , CHEUNG W K , LI X ,et al. Aligning users across social networks using network embedding[C]// International Joint Conference on Artificial Intelligence. 2016: 1774-1780.
|
[4] |
TAN S , GUAN Z , CAI D ,et al. Mapping users across networks by manifold alignment on hypergraph[C]// AAAI Conference on Artificial Intelligence. 2014: 159-165.
|
[5] |
ZHANG J , YU P S . Integrated anchor and social link predictions across social networks[C]// International Joint Conference on Artificial Intelligence. 2015: 2125-2132.
|
[6] |
BACKSTROM L , DWORK C , KLEINBERG J . Wherefore art thou r3579x? anonymized social networks,hidden patterns,and structural steganography[C]// International World Wide Web Conference. 2007: 181-190.
|
[7] |
NARAYANAN A , SHMATIKOV V . De-anonymizing social networks[C]// IEEE Symposium on Security and Privacy. 2009: 173-187.
|
[8] |
NILIZADEH S , KAPADIA A , AHN Y Y . Community-enhanced de-anonymization of online social networks[C]// ACM Conference on Computer and Communications Security. 2014: 537-548.
|
[9] |
SRIVATSA M , HICKS M . Deanonymizing mobility traces:using social networks as a side-channel[C]// ACM Conference on Computer and Communications Security. 2012: 628-637.
|
[10] |
JI S , LI W , SRIVATSA M ,et al. Structure based data de-anonymization of social networks and mobility traces[C]// Information Security Conference. 2014: 237-254.
|
[11] |
尹赢, 吉立新, 黄瑞阳 ,等. 网络表示学习的研究与发展[J]. 网络与信息安全学报, 2019,5(2): 77-87.
|
|
YIN Y , JI L X , HUANG R Y ,et al. Research and development of network representation learning[J]. Chinese Journal of Network and Information Security, 2019,5(2): 77-87.
|
[12] |
PEDARSANI P , FIGUEIREDO D R , GROSSGLAUSER M . A bayesian method for matching two similar graphs without seeds[C]// The 51st Annual Allerton Conference on Communication,Control & Computing. 2013: 1598-1607.
|
[13] |
HAY M , MIKLAU G , JENSEN D ,et al. Anonymizing social networks[C]// Computer Science Department Faculty Publication Series. 2007: 180-196.
|
[14] |
TANG J , QU M , WANG M ,et al. Line:large- scale information network embedding[C]// International World Wide Web Conference. 2015: 1067-1077.
|
[15] |
CAO S , LU W , XU Q . Grarep:learning graph representations with global structural information[C]// ACM International on Conference on Information & Knowledge Management. 2015: 891-900.
|