-
1
-
-
52649110568
-
Never walk alone, Uncertainty for anonymity in moving objects Databases
-
O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects Databases. In ICDE, pages 376-385, 2008.
-
(2008)
In ICDE
, pp. 376-385
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
2
-
-
35348848696
-
Wherefore art thou r3579x, anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007.
-
(2007)
In WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.M.3
-
3
-
-
80054072531
-
HyperANF, Approximating the neighbourhood function of very large graphs on a budget
-
P. Boldi, M. Rosa, and S. Vigna. HyperANF: Approximating the neighbourhood function of very large graphs on a budget. In WWW, pages 625-634, 2011.
-
(2011)
In WWW
, pp. 625-634
-
-
Boldi, P.1
Rosa, M.2
Vigna, S.3
-
4
-
-
79957862437
-
Identity obfuscation in graphs through the information theoretic lens
-
F. Bonchi, A. Gionis, and T. Tassa. Identity obfuscation in graphs through the information theoretic lens. In ICDE, pages 924-935, 2011.
-
(2011)
In ICDE
, pp. 924-935
-
-
Bonchi, F.1
Gionis, A.2
Tassa, T.3
-
5
-
-
67650683099
-
A clustering approach for data and structural anonymity in social networks
-
A. Campan and T. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, pages 33-54, 2008.
-
(2008)
In PinKDD
, pp. 33-54
-
-
Campan, A.1
Truta, T.2
-
6
-
-
0031353179
-
Size-estimation framework with applications to transitive closure and reachability
-
E. Cohen. Size-estimation framework with applications to transitive closure and reachability. Journal of Computer and System Sciences, 55(3):441-453, 1997.
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.3
, pp. 441-453
-
-
Cohen, E.1
-
7
-
-
84865069350
-
Class-based graph anonymization for social network data
-
G. Cormode, D. Srivastava, S. Bhagat, and B. Krishnamurthy. Class-based graph anonymization for social network data. PVLDB, 2(1):766-777, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 766-777
-
-
Cormode, G.1
Srivastava, D.2
Bhagat, S.3
Krishnamurthy, B.4
-
8
-
-
72749109110
-
Anonymizing bipartite graph data using safe groupings
-
G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. PVLDB, 1(1):833-844, 2008.
-
(2008)
PVLDB
, vol.1
, Issue.1
, pp. 833-844
-
-
Cormode, G.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
9
-
-
79953816854
-
A comparison of three algorithms for approximating the distance distribution in real-world graphs
-
P. Crescenzi, R. Grossi, L. Lanzi, and A. Marino. A comparison of three algorithms for approximating the distance distribution in real-world graphs. In TAPAS, pages 92-103, 2011.
-
(2011)
In TAPAS
, pp. 92-103
-
-
Crescenzi, P.1
Grossi, R.2
Lanzi, L.3
Marino, A.4
-
10
-
-
78650524241
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and C. Li. Resisting structural re-identification in anonymized social networks. VLDB Journal, 19(6):797-823, 2010.
-
(2010)
VLDB Journal
, vol.19
, Issue.6
, pp. 797-823
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.F.4
Li, C.5
-
11
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. In PVLDB, 1(1):102-114, 2008.
-
(2008)
In PVLDB
, vol.1
, Issue.1
, pp. 102-114
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.F.4
Weis, P.5
-
12
-
-
41849128290
-
Anonymizing social networks
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. University of Massachusetts Technical Report, 07(19), 2007.
-
(2007)
University of Massachusetts Technical Report
, vol.7
, Issue.19
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
13
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301):13-30, 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
14
-
-
80052650977
-
Discovering highly reliable subgraphs in uncertain graphs
-
R. Jin, L. Liu, and C. C. Aggarwal. Discovering highly reliable subgraphs in uncertain graphs. In KDD, pages 992-1000, 2011.
-
(2011)
In KDD
, pp. 992-1000
-
-
Jin, R.1
Liu, L.2
Aggarwal, C.C.3
-
15
-
-
80052652443
-
Distance-constraint reachability computation in uncertain graphs
-
R. Jin, L. Liu, B. Ding, and H. Wang. Distance-constraint reachability computation in uncertain graphs. PVLDB, 4(9):551-562, 2011.
-
(2011)
PVLDB
, vol.4
, Issue.9
, pp. 551-562
-
-
Jin, R.1
Liu, L.2
Ding, B.3
Wang, H.4
-
17
-
-
79952540632
-
HADI, Mining radii of large graphs
-
U. Kang, C. E. Tsourakakis, A. P. Appel, C. Faloutsos, and J. Leskovec. HADI: Mining radii of large graphs. ACM Transactions on Knowledge Discovery from Data, 5(2):8, 2011.
-
(2011)
ACM Transactions on Knowledge Discovery from Data
, vol.5
, Issue.2
-
-
Kang, U.1
Tsourakakis, C.E.2
Appel, A.P.3
Faloutsos, C.4
Leskovec, J.5
-
19
-
-
57149126815
-
Towards identity anonymization on graphs
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD Conference, pages 93-106, 2008.
-
(2008)
In SIGMOD Conference
, pp. 93-106
-
-
Liu, K.1
Terzi, E.2
-
20
-
-
0034299710
-
Harmony in the small-world
-
M. Marchiori and V. Latora. Harmony in the small-world. Physica A, 285:539-546, 2000.
-
(2000)
Physica A
, vol.285
, pp. 539-546
-
-
Marchiori, M.1
Latora, V.2
-
21
-
-
84863182736
-
Privacy risk in graph stream publishing for social network data
-
N. Medforth and K. Wang. Privacy risk in graph stream publishing for social network data. In ICDM, pages 437-446, 2011.
-
(2011)
In ICDM
, pp. 437-446
-
-
Medforth, N.1
Wang, K.2
-
23
-
-
0242625288
-
Anf, a fast and scalable tool for data mining in massive graphs
-
C. R. Palmer, P. B. Gibbons, and C. Faloutsos. Anf: a fast and scalable tool for data mining in massive graphs. In KDD, pages 81-90, 2002.
-
(2002)
In KDD
, pp. 81-90
-
-
Palmer, C.R.1
Gibbons, P.B.2
Faloutsos, C.3
-
24
-
-
79952560845
-
k-Nearest neighbors in uncertain graphs
-
M. Potamias, F. Bonchi, A. Gionis, and G. Kollios. k-Nearest neighbors in uncertain graphs. PVLDB, 3(1):997-1008, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 997-1008
-
-
Potamias, M.1
Bonchi, F.2
Gionis, A.3
Kollios, G.4
-
25
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information (abstract)
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In PODS, page 188, 1998.
-
(1998)
In PODS
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
27
-
-
0001390587
-
The degree variance, An index of graph heterogeneity
-
T. Snijders. The degree variance: An index of graph heterogeneity. Social Networks, 3(3):163-174, 1981.
-
(1981)
Social Networks
, vol.3
, Issue.3
, pp. 163-174
-
-
Snijders, T.1
-
30
-
-
70350402281
-
The union-split algorithm and cluster-based anonymization of social networks
-
B. Thompson and D. Yao. The union-split algorithm and cluster-based anonymization of social networks. In ASIACCS, pages 218-227, 2009.
-
(2009)
In ASIACCS
, pp. 218-227
-
-
Thompson, B.1
Yao, D.2
-
31
-
-
77952279599
-
k-Symmetry model for identity anonymization in social networks
-
W. Wu, Y. Xiao, W. Wang, Z. He, and Z. Wang. k-Symmetry model for identity anonymization in social networks. In EDBT, pages 111-122, 2010.
-
(2010)
In EDBT
, pp. 111-122
-
-
Wu, W.1
Xiao, Y.2
Wang, W.3
He, Z.4
Wang, Z.5
-
32
-
-
77951497108
-
Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing
-
X. Ying, K. Pan, X. Wu, and L. Guo. Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing. In SNA-KDD, pages 1-10, 2009.
-
(2009)
In SNA-KDD
, pp. 1-10
-
-
Ying, X.1
Pan, K.2
Wu, X.3
Guo, L.4
-
33
-
-
41849118008
-
Preserving the privacy of sensitive relationship in graph data
-
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationship in graph data. In PinKDD, pages 153-171, 2007.
-
(2007)
In PinKDD
, pp. 153-171
-
-
Zheleva, E.1
Getoor, L.2
-
34
-
-
52649120205
-
Preserving privacy in social networks against neighborhood attacks
-
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506-515, 2008.
-
(2008)
In ICDE
, pp. 506-515
-
-
Zhou, B.1
Pei, J.2
-
35
-
-
84865065669
-
K-automorphism, A general framework for privacy preserving network publication
-
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. PVLDB, 2(1):946-957, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
-
36
-
-
77956193984
-
Discovering frequent subgraphs over uncertain graph databases under probabilistic semantics
-
Z. Zou, H. Gao, and J. Li. Discovering frequent subgraphs over uncertain graph databases under probabilistic semantics. In KDD, pages 633-642, 2010.
-
(2010)
In KDD
, pp. 633-642
-
-
Zou, Z.1
Gao, H.2
Li, J.3
-
37
-
-
77952764293
-
Finding top-k maximal cliques in an uncertain graph
-
Z. Zou, J. Li, H. Gao, and S. Zhang. Finding top-k maximal cliques in an uncertain graph. In ICDE, pages 649-652, 2010.
-
(2010)
In ICDE
, pp. 649-652
-
-
Zou, Z.1
Li, J.2
Gao, H.3
Zhang, S.4
-
38
-
-
77955171415
-
Mining frequent subgraph patterns from uncertain graph data
-
Z. Zou, J. Li, H. Gao, and S. Zhang. Mining frequent subgraph patterns from uncertain graph data. IEEE Transactions on Knowledge and Data Engineering, 22(9):1203-1218, 2010.
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, Issue.9
, pp. 1203-1218
-
-
Zou, Z.1
Li, J.2
Gao, H.3
Zhang, S.4
|