-
1
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A.-L. Barabasi. Error and attack tolerance of complex networks. Nature, 406:378, 2000.
-
(2000)
Nature
, vol.406
, pp. 378
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
2
-
-
35348848696
-
Wherefore art thou r3579x? Anonymized social networks, hidden patterns, and structural steganography
-
L. Backtrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In WWW'07, 2007.
-
(2007)
WWW'07
-
-
Backtrom, L.1
Dwork, C.2
Kleinberg, J.3
-
3
-
-
0008690083
-
-
Technical Report TR 96-120, Dept. of Computing Science, University of Alberta, Canada
-
S. Fortin. The graph isomorphism problem. Technical Report TR 96-120, Dept. of Computing Science, University of Alberta, Canada, 1996.
-
(1996)
The Graph Isomorphism Problem
-
-
Fortin, S.1
-
4
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D.Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. In VLDB'08, 2008.
-
(2008)
VLDB'08
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
5
-
-
41849128290
-
-
Technical Report 07-19, UMass Amherst
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07-19, UMass Amherst, 2007.
-
(2007)
Anonymizing Social Networks
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
7
-
-
57149126815
-
Towards identity anonymization on graphs
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD'08, 2008.
-
(2008)
SIGMOD'08
-
-
Liu, K.1
Terzi, E.2
-
9
-
-
0001460788
-
A note on the graph isomorphism counting problem
-
R. Mathon. A note on the graph isomorphism counting problem. Information Processing Letters, 8:131-132, 1979.
-
(1979)
Information Processing Letters
, vol.8
, pp. 131-132
-
-
Mathon, R.1
-
15
-
-
54149109383
-
Network quotients: Structural skeletons of complex systems
-
Y. Xiao, B. D. MacArthur, H. Wang, M. Xiong, and W. Wang. Network quotients: Structural skeletons of complex systems. Physical Review E, 78:046102, 2008.
-
(2008)
Physical Review E
, vol.78
, pp. 046102
-
-
Xiao, Y.1
MacArthur, B.D.2
Wang, H.3
Xiong, M.4
Wang, W.5
-
16
-
-
70349097958
-
Efficiently indexing shortest path by exploiting symmetry in graphs
-
Y. Xiao, W. Wu, J. Pei, and Z. H. W. Wang. Efficiently indexing shortest path by exploiting symmetry in graphs. In EDBT'09, 2009.
-
(2009)
EDBT'09
-
-
Xiao, Y.1
Wu, W.2
Pei, J.3
Wang, Z.H.W.4
-
17
-
-
45249123627
-
Emergence of symmetry in complex networks
-
Y. Xiao, M. Xiong, W. Wang, and H. Wang. Emergence of symmetry in complex networks. Physical Review E, 77:066108, 2008.
-
(2008)
Physical Review E
, vol.77
, pp. 066108
-
-
Xiao, Y.1
Xiong, M.2
Wang, W.3
Wang, H.4
-
18
-
-
52949118863
-
Randomizing social networks: A spectrum preserving approach
-
X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SIAM Conf. on Data Mining, 2007.
-
SIAM Conf. on Data Mining, 2007
-
-
Ying, X.1
Wu, X.2
-
19
-
-
52649120205
-
Preserving privacy in social networks against neighborhood attacks
-
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE'08, 2008.
-
(2008)
ICDE'08
-
-
Zhou, B.1
Pei, J.2
-
20
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. PVLDB, 2(1):946-957, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
|