-
2
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007.
-
(2007)
WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.M.3
-
3
-
-
84873384215
-
Differentially private data analysis of social networks via restricted sensitivity
-
ACM
-
J. Blocki, A. Blum, A. Datta, and O. Sheffet. Differentially private data analysis of social networks via restricted sensitivity. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pages 87-96. ACM, 2013.
-
(2013)
Proceedings of the 4th Conference on Innovations in Theoretical Computer Science
, pp. 87-96
-
-
Blocki, J.1
Blum, A.2
Datta, A.3
Sheffet, O.4
-
4
-
-
0031198630
-
On a relation between graph edit distance and maximum common subgraph
-
Aug.
-
H. Bunke. On a relation between graph edit distance and maximum common subgraph. Pattern Recogn. Lett., 18(9):689-694, Aug. 1997.
-
(1997)
Pattern Recogn. Lett.
, vol.18
, Issue.9
, pp. 689-694
-
-
Bunke, H.1
-
5
-
-
84880566095
-
Recursive mechanism: Towards node differential privacy and unrestricted joins
-
S. Chen and S. Zhou. Recursive mechanism: Towards node differential privacy and unrestricted joins. In SIGMOD, pages 653-664, 2013.
-
(2013)
SIGMOD
, pp. 653-664
-
-
Chen, S.1
Zhou, S.2
-
6
-
-
75949123863
-
Anonymizing bipartite graph data using safe groupings
-
G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. VLDB J., pages 115-139, 2010.
-
(2010)
VLDB J.
, pp. 115-139
-
-
Cormode, G.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
7
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, pages 1-12, 2006.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
9
-
-
70350645515
-
The differential privacy frontier (extended abstract)
-
C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
-
(2009)
TCC
, pp. 496-502
-
-
Dwork, C.1
-
10
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology-EUROCRYPT 2006, pages 486-503. Springer, 2006.
-
(2006)
Advances in Cryptology-EUROCRYPT 2006
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
77957582791
-
Differential privacy for statistics: What we know and what we want to learn
-
C. Dwork and A. Smith. Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality, 1(2):2, 2010.
-
(2010)
Journal of Privacy and Confidentiality
, vol.1
, Issue.2
, pp. 2
-
-
Dwork, C.1
Smith, A.2
-
13
-
-
84881655597
-
Moment-based estimation of stochastic kronecker graph parameters
-
D. F. Gleich and A. B. Owen. Moment-based estimation of stochastic kronecker graph parameters. Internet Mathematics, 8(3):232-256, 2012.
-
(2012)
Internet Mathematics
, vol.8
, Issue.3
, pp. 232-256
-
-
Gleich, D.F.1
Owen, A.B.2
-
14
-
-
84879816605
-
Beyond worst-case analysis in private singular vector computation
-
M. Hardt and A. Roth. Beyond worst-case analysis in private singular vector computation. In STOC, 2013.
-
(2013)
STOC
-
-
Hardt, M.1
Roth, A.2
-
15
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, pages 169-178, 2009.
-
(2009)
ICDM
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
16
-
-
78650524241
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and C. Li. Resisting structural re-identification in anonymized social networks. VLDB J., pages 797-823, 2010.
-
(2010)
VLDB J.
, pp. 797-823
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.F.4
Li, C.5
-
17
-
-
84995700579
-
Private analysis of graph structure
-
V. Karwa, S. Raskhodnikova, A. Smith, and G. Yaroslavtsev. Private analysis of graph structure. TODS, 39(3):22, 2014.
-
(2014)
TODS
, vol.39
, Issue.3
, pp. 22
-
-
Karwa, V.1
Raskhodnikova, S.2
Smith, A.3
Yaroslavtsev, G.4
-
18
-
-
84867507326
-
Differentially private graphical degree sequences and synthetic graphs
-
Springer
-
V. Karwa and A. B. Slavković. Differentially private graphical degree sequences and synthetic graphs. In Privacy in Statistical Databases, pages 273-285. Springer, 2012.
-
(2012)
Privacy in Statistical Databases
, pp. 273-285
-
-
Karwa, V.1
Slavković, A.B.2
-
19
-
-
84873947082
-
Analyzing graphs with node differential privacy
-
Springer
-
S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith. Analyzing graphs with node differential privacy. In Theory of Cryptography, pages 457-476. Springer, 2013.
-
(2013)
Theory of Cryptography
, pp. 457-476
-
-
Kasiviswanathan, S.P.1
Nissim, K.2
Raskhodnikova, S.3
Smith, A.4
-
20
-
-
77949501427
-
Kronecker graphs: An approach to modeling networks
-
J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs: An approach to modeling networks. The Journal of Machine Learning Research, 11:985-1042, 2010.
-
(2010)
The Journal of Machine Learning Research
, vol.11
, pp. 985-1042
-
-
Leskovec, J.1
Chakrabarti, D.2
Kleinberg, J.3
Faloutsos, C.4
Ghahramani, Z.5
-
22
-
-
84880543792
-
Information preservation in statistical privacy and Bayesian estimation of unattributed histograms
-
B.-R. Lin and D. Kifer. Information preservation in statistical privacy and bayesian estimation of unattributed histograms. In SIGMOD, pages 677-688, 2013.
-
(2013)
SIGMOD
, pp. 677-688
-
-
Lin, B.-R.1
Kifer, D.2
-
23
-
-
57149126815
-
Towards identity anonymization on graphs
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, pages 93-106, 2008.
-
(2008)
SIGMOD
, pp. 93-106
-
-
Liu, K.1
Terzi, E.2
-
24
-
-
84907033180
-
Exponential random graph estimation under differential privacy
-
W. Lu and G. Miklau. Exponential random graph estimation under differential privacy. In KDD, pages 921-930, 2014.
-
(2014)
KDD
, pp. 921-930
-
-
Lu, W.1
Miklau, G.2
-
25
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, 2007.
-
(2007)
FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
26
-
-
84864136545
-
A differentially private estimator for the stochastic kronecker graph model
-
ACM
-
D. Mir and R. N. Wright. A differentially private estimator for the stochastic kronecker graph model. In Proceedings of the 2012 Joint EDBT/ICDT Workshops, pages 167-176. ACM, 2012.
-
(2012)
Proceedings of the 2012 Joint EDBT/ICDT Workshops
, pp. 167-176
-
-
Mir, D.1
Wright, R.N.2
-
29
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
30
-
-
84893263337
-
Privacy and mechanism design
-
M. M. Pai and A. Roth. Privacy and mechanism design. ACM SIGecom Exchanges, 12(1):8-29, 2013.
-
(2013)
ACM SIGecom Exchanges
, vol.12
, Issue.1
, pp. 8-29
-
-
Pai, M.M.1
Roth, A.2
-
31
-
-
84901767186
-
Calibrating data to sensitivity in private data analysis
-
D. Proserpio, S. Goldberg, and F. McSherry. Calibrating data to sensitivity in private data analysis. PVLDB, 7(8), 2014.
-
(2014)
PVLDB
, vol.7
, Issue.8
-
-
Proserpio, D.1
Goldberg, S.2
McSherry, F.3
-
32
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
-
(2009)
PODS
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
33
-
-
82955196835
-
Sharing graphs using differentially private graph models
-
ACM
-
A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In IMC, pages 81-98. ACM, 2011.
-
(2011)
IMC
, pp. 81-98
-
-
Sala, A.1
Zhao, X.2
Wilson, C.3
Zheng, H.4
Zhao, B.Y.5
-
34
-
-
84871834738
-
Anonymization of centralized and distributed social networks by sequential clustering
-
T. Tassa and D. Cohen. Anonymization of centralized and distributed social networks by sequential clustering. TKDE, 25(2), 2013.
-
(2013)
TKDE
, vol.25
, Issue.2
-
-
Tassa, T.1
Cohen, D.2
-
35
-
-
84881628005
-
Preserving differential privacy in degree-correlation based graph generation
-
Aug.
-
Y. Wang and X. Wu. Preserving differential privacy in degree-correlation based graph generation. Trans. Data Privacy, 6(2):127-145, Aug. 2013.
-
(2013)
Trans. Data Privacy
, vol.6
, Issue.2
, pp. 127-145
-
-
Wang, Y.1
Wu, X.2
-
37
-
-
52649120205
-
Preserving privacy in social networks against neighborhood attacks
-
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506-515, 2008.
-
(2008)
ICDE
, pp. 506-515
-
-
Zhou, B.1
Pei, J.2
-
38
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. In PVLDB, pages 946-957, 2009.
-
(2009)
PVLDB
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
|