[1] |
BHAGAT S , CORMODE G , KRISHNAMURTHY B , et al. Class-based graph anaonymization for social network data[EB/OL]. http://www.vldb.org/pvldb/2/vldb09-pvldb26.pdf.
|
[2] |
刘向宇, 王斌, 杨晓春 . 社会网络数据发布隐私保护技术综述[J]. 软件学报, 2014, 25(3): 576-590.
|
|
LIU X Y , WANG B , YANG X C . Social network data privacy pro-tection technology review[J]. Journal of Software, 2014, 25(3): 576-590.
|
[3] |
HAY M , MIKLAU G , JENSEN D , et al. Anonymizing social net-works[R]. University of Massachusetts, 2007.
|
[4] |
LIU K , TERZI E , NAMBOODIRI V . Towards identity anonymization on graphs[C]// The ACM Sigmod International Conference on Management of Data. c2008.
|
[5] |
ZOU L , CHEN L . K-automorphism:a general framework for privacy preserving network publication [C]// The 35th International Conference on Very Large Data Base. c2009: 946-957.
|
[6] |
ZHOU B , PEI J . Preserving privacy in social networks against neighborhood attacks[C]// The 24th IEEE International Conference on Data Engineering (ICDE). c2008.
|
[7] |
宋喜忠, 刘康明 . 基于 k-subgrap 算法的社交网络隐私保护研究[J]. 科技通报, 2015(1): 155-157.
|
|
SONG X Z , LIU K M . Social network privacy protection study based on k-subgrap algorithm[J]. Bulletin Science and Technology, 2015(1): 155-157.
|
[8] |
HAY M , MIKLAU G , JENSEN D , et al. Resisting structural re-identification in anonymized social networks [J]. VLDB Journa1, 2010, 19(6): 797-823.
|
[9] |
韦伟, 李杨, 张为群 . 一种基于 GSNPP 算法的社交网络隐私保护方法研究[J]. 计算机科学, 2012, 39(3): 104-106.
|
|
WEI W , LI Y , ZHANG W Q . A GSNPP algorithm based on the social network privacy protection method research[J]. Journal of Computer Science, 2012, 39(3): 104-106.
|
[10] |
THOMPSON B , YAO D F , NAMBOODIRI V . The union-split algorithm and clus-ter-based anonymization of social networks [C]// The 4th Interna-tional Symposium on Information,Computer,and Communications Security. c2013: 218-227.
|
[11] |
孔庆江 . 社交网络中个人信息与人际关系的隐私保护研究[D]. 杭州: 浙江工业大学, 2011.
|
|
KONG Q J . Personal information and relationships in the social network privacy protection research[D]. Hangzhou: Zhejiang Uni-versity of Technology, 2011.
|
[12] |
YUAN M X , CHEN L , YU PS , YU T . Protecting sensitive labels in social network data anonymization[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(3): 633-647.
|
[13] |
付艳艳, 张敏, 冯登国 , 等. 基于节点分割的社交网络属性隐私保护[J]. 软件学报, 2014, 4: 768-780.
|
|
FU Y Y , ZHANG M , FENG D G , et al. Social network privacy protection based on the node split attributes[J]. Journal of Software, 2014, 4: 768-780.
|
[14] |
吕志泉, 洪澄, 张敏 , 等. 面向社交网络的隐私保护方案[J]. 通信学报, 2014, 35(8): 23-32.
|
|
LV Z Q , HONG C , ZHANG M , et al. Privacy protection scheme for social network[J]. Journal on Communications, 2014, 35(8): 23-32.
|
[15] |
LING C , NEWPORT C . Provably secure ciphertext policy ABE[C]// The 14th ACM Conference on Computer and Communica-tions Security. c2007: 456-465.
|