Journal on Communications ›› 2015, Vol. 36 ›› Issue (9): 145-159.doi: 10.11959/j.issn.1000-436x.2015165
• academic paper • Previous Articles Next Articles
Li-hui LAN1,2,Shi-guang JU1
Online:
2015-09-25
Published:
2017-09-15
Supported by:
Li-hui LAN,Shi-guang JU. Privacy preserving based on differential privacy for weighted social networks[J]. Journal on Communications, 2015, 36(9): 145-159.
[1] | ZHELEVA E , GETOOR L . Preserving the privacy of sensitive rela-tionships in graph data[J]. Lecture Notes in Computer Science, 2008,4890:153-171. |
[2] | CAMPAN A , TRUTA T M . Data and structural k-anonymity in social networks[J]. Lecture Notes in Computer Science, 2009,5456:33-54. |
[3] | CORMODE G , SRIVASTAVA D , YU T . Anonymizing bipartite graph data using safe groupings[J]. VLDB Journal, 2010,19(1): 115-139. |
[4] | SIHAG V K . A clustering approach for structural k-anonymity in social networks using genetic algorithm[A]. Proceeding of the Interna-tional Information Technology Conference[C]. CUBE,ACM, 2012.701-706. |
[5] | TASSA T , COHEN D . Anonymization of centralized and distributed social networks by sequential clustering[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(2): 311-324. |
[6] | BABU K S , JENA S K . Anonymizing social networks:a generalization approach[J]. Computers &Electrical Engineering, 2013,39(7): 1947-1961. |
[7] | HSU T , LIAU C J , WANG D W . A logical framework for pri-vacy-preserving social network publication[J]. Journal of Applied Logic, 2014,12(2): 151-174. |
[8] | KULKARNI A R , YOGISH H K . Advanced unsupervised anonymiza-tion technique in social networks for privacy preservation[J]. Interna-tional Journal, 2014.118-125. |
[9] | ZHOU B , PEI J . Preserving privacy in social networks against neigh-borhood attacks[A]. Proceeding of ICDE'08[C]. Cancun,Mexico, 2008.506-515. |
[10] | LIU K , TERZI E . Towards identity anonymization on graphs[A]. Proceedings of SIGMOD'08[C]. ACM, 2008.93-106. |
[11] | HAY M , MIKLAU G , JENSEN D , et al. Anonymizing Social Net-works[R]. Technical Report,University of Massachusetts Amherst, 2007.173-187. |
[12] | YING X W , WU X T . Randomizing social networks:a spectrum preserving approach[A]. Proceeding of SIAM'08[C]. Atlanta,United States, 2008.739-750. |
[13] | ZOU L , CHEN L , ?ZSU M T . K-automorphism:general framework for privacy reserving network publication[A]. Proceeding of VLDB'09[C]. Lyon,France, 2009.946-957. |
[14] | TRIPATHY B K , SISHODIA M S , JAIN S , et al. Privacy and Ano-nymization in Social Networks[M]. Springer International Publishing, 2014.243-270. |
[15] | TRIPATHY B K , PANDA G K . A new approach to manage security against neighborhood attacks in social networks[A]. Proceeding of ASONAM'10[C]. 2010.264-269. |
[16] | TRUTA T M , CAMPAN A , RALESCU A L . Preservation of structural properties in anonymized social networks[A]. Proceeding of the 8th Collaborative Computing:Networking,Applications and Workshar-ing[C]. 2012.619-627. |
[17] | MASOUMZADEH A , JOSHI J . Preserving structural properties in edge-perturbing anonymization techniques for social net-works[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(6): 877-889. |
[18] | 熊平, 朱天清, 王晓峰 . 差分隐私保护及其应用[J]. 计算机学报, 2014,37(1): 101-122. XIONG P , ZHU T Q , WANG XF . A survey on differential privacy and applications[J]. Chinese Journal of Computers, 2014,37(1): 101-122. |
[19] | LIU L , WANG J , LIU J , et al. Privacy Preserving in Social Networks Against Sensitive Edge Disclosure[R]. Technical Report CMIDA-HiPSCCS 006-08.Department of Computer Science,University of Kentucky,KY, 2008. |
[20] | DAS S , EGECIOGLU ? , ABBADI A E . Anónimos:an LP-based approach for anonymizing edge-weighted social network graphs[J]. IEEE Transac-tions on Knowledge and Data Engineering, 2012,4(4): 590-603. |
[21] | SKARKALA M E , MARAGOUDAKIS M , GRITZALIS S , et al. Privacy preservation by k-anonymization of weighted social net-works[A]. Proceeding of ASONAM'12[C].IEEE Computer Society, 2012.423-428. |
[22] | LI Y , SHEN H . Anonymizing graphs against weight-Based attacks[A]. Proceeding of ICDMW'10[C]. 2010.491-498. |
[23] | HAY M , LI C , MIKLAU G , et al. Accurate estimation of the degree distribution of private networks[A]. Proceedings of ICDM '09, Miami,United States, 2009.169-178. |
[24] | SALA A , ZHAO X H , WILSON C , et al. Sharing graphs using differentially private graph models[A]. Proceedings of SIG-COMM'11, Berlin,Germany, 2011.81-98. |
[25] | KASIVISWANATHAN S P , NISSIM K , RASKHODNIKOVA S , et al. Analyzing Graphs with Node Differential Privacy[M]. Theory of Cryp-tography,Springer Berlin Heidelberg, 2013.457-476. |
[26] | DWORK C . Differential Privacy[M]. Automata,Languages and Pro-gramming,Springer Berlin Heidelberg, 2006.1-12. |
[27] | 张啸剑, 孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014,37(4): 927-949. ZHANG X J , MENG X F . Differential privacy in data publication and analysis[J]. Chinese Journal of Computers, 2014,37(4): 927-949. |
[28] | DWORK C , MCSHERRY F , NISSIM K , et al. Calibrating Noise to Sensitivity in Private Data Analysis[M]. Springer Berlin Heidelberg, 2006.265-284. |
[29] | HAY M , RASTOGI V , MIKLAU G , et al. Boosting the accuracy of differentially private histograms through consistency[J]. Proceedings of the VLDB Endowment, 2010,3(1): 1021-1032. |
[30] | DWORK C . Differential Privacy:a Survey of Results[M]. Springer Berlin Heidelberg, 2008.1-19. |
[31] | Karate[EB/OL]. , 2011-01-05/2012-03-02. |
[32] | Lesmis[EB/OL]. , 2011-08-18/2012-03-02. |
[33] | Prefuse[EB/OL]. , 2007-10-21/2012-03-02. |
[34] | PowerGrid[EB/OL]. , 2013-04-15/2013-05-02. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[6] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[7] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[8] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[9] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[10] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[11] | Lichuan MA, Jiayi PENG, Qingqi PEI, Haojin ZHU. Efficient privacy-preserving decision tree classification protocol [J]. Journal on Communications, 2021, 42(8): 80-89. |
[12] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[13] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[14] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[15] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|