[1] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-258.
|
|
FENG D G , ZHANG M , LI H ,et al. Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-258.
|
[2] |
WONG R C W , LI J , FU A W C ,et al. (α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing[C]// The 12th ACM SIGKDD international conference on Knowledge discovery and data mining. 2006: 754-759.
|
[3] |
CORMODE G , SRIVASTAVA D , YU T ,et al. Anonymizing bipartite graph data using safe groupings[J]. The VLDB Journal—The International Journal on Very Large Data Bases, 2010,19(1): 115-139.
|
[4] |
CHENG J , FU A W , LIU J . K-isomorphism:privacy preserving network publication against structural attacks[C]// The 2010 ACM SIGMOD International Conference on Management of Data. 2010: 459-470.
|
[5] |
ABAWAJY J H , NINGGAL M I H , HERAWAN T . Privacy preserving social network data publication[J]. IEEE Communications Surveys &Tutorials, 2016,18(3): 1974-1997.
|
[6] |
LIU L , WANG J , LIU J ,et al. Privacy preserving in social networks against sensitive edge disclosure[R]. Technical Report Technical Report CMIDA-HiPSCCS 006-08, 2008.
|
[7] |
DAS S , E?ECIO?LU ? , EL ABBADI A . Anonymizing weighted social network graphs[C]// 2010 IEEE 26th International Conference on Data Engineering (ICDE). 2010: 904-907.
|
[8] |
LI Y , LI Y , YAN Q ,et al. Privacy leakage analysis in online social networks[J]. Computers & Security, 2015,49: 239-254.
|
[9] |
苏洁, 刘帅, 罗智勇 ,等. 基于信息损失量估计的匿名图构造方法[J]. 通信学报, 2016,37(6): 56-64.
|
|
SU J , LIU S , LUO Z Y ,et al. Method of constructing an anonymous graph based on information loss estimation[J]. Journal on Communi-cations, 2016,37(6): 56-64.
|
[10] |
LIU D , WANG H , VAN M P . Spectral perturbation and reconstructability of complex networks[J]. Physical Review E, 2010,81(1):016101.
|
[11] |
XU S , ZHANG J , HAN D ,et al. Singular value decomposition based data distortion strategy for privacy preserving[J]. Knowledge and Information Systems, 2006,10(3): 383-397.
|
[12] |
WU L , YING X , WU X . Reconstruction from randomized graph via low rank approximation[C]// The 2010 SIAM International Conference on Data Mining,Society for Industrial and Applied Mathematics. 2010: 60-71.
|
[13] |
PECH R , HAO D , PAN L ,et al. Link prediction via matrix completion[J]. EPL (Europhysics Letters), 2017,117(3):38002.
|
[14] |
XU X , LIU B , WU J ,et al. Link prediction in complex networks via matrix perturbation and decomposition[J]. Scientific Reports, 2017,7(1):14724.
|
[15] |
SARKAR S , . Spectral (re) construction of urban street networks:generative design using global information from structure[M]// Design Computing and Cognition'14. Springer International Publishing, 2015: 41-55.
|
[16] |
张贤达 . 矩阵分析与应用(第2版)[M]. 北京: 清华大学出版社, 2013.
|
|
ZHANG X D . Matrix analysis and applications(second edi-tion)[M]. Beijing: Tsinghua University PressPress, 2013.
|
[17] |
戴华 . 矩阵论[M]. 北京: 科学出版社, 2001.
|
|
DAI H . Matrix theo-ry[M]. Beijing: Science PressPress, 2001.
|
[18] |
HORN R A , JOHNSON C R . 矩阵分析[M]. 天津: 天津大学出版社, 1989.
|
|
HORN R A,JOHNSON , C R . Matrix analysis[M]. Tianjin: Tianjin University PressPress, 2001.
|
[19] |
ZHANG X D . Matrix analysis and applications[M]. Cambridge University Press, 2017.
|
[20] |
ERD?S P RéNYI A . On the evolution of random graphs[J]. Transactions of the American Mathematical Society, 1984,286(1): 257-274.
|
[21] |
BARABáSI A L , ALBERT R . Emergence of scaling in random networks[J]. Science, 1999,286(5439): 509-512.
|
[22] |
WATTS D J , STROGATZ S H . Collective dynamics of “small-world”networks[J]. Nature, 1998,393(6684): 440-442.
|
[23] |
ABUELHAIJA S , PEROZZI B , ALRFOU R . Learning edge representations via low-rank asymmetric projections[C]// The 2017 ACM Conference on Information and Knowledge Management. 2017: 1787-1796.
|
[24] |
GLEISER P M , DANON L . Community structure in jazz[J]. Advances in Complex Systems, 2003,6(4): 565-573.
|