-
1
-
-
84983280517
-
-
Minimum cost flow algorithm, https://github.com/nikhilgarg28/libalgo/ blob/master/MinCostFlow.java.
-
Minimum Cost Flow Algorithm
-
-
-
3
-
-
84961988789
-
-
Tech. rep., DTIC Document
-
AHUJA, R. K., MAGNANTI, T. L., AND ORLIN, J. B. Network flows. Tech. rep., DTIC Document, 1988.
-
(1988)
Network Flows
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
4
-
-
0028518325
-
Improved algorithms for bipartite network flow
-
AHUJA, R. K., ORLIN, J. B., STEIN, C., AND TARJAN, R. E. Improved algorithms for bipartite network flow. SICOMP 23, 5 (1994), 906-933.
-
(1994)
SICOMP
, vol.23
, Issue.5
, pp. 906-933
-
-
Ahuja, R.K.1
Orlin, J.B.2
Stein, C.3
Tarjan, R.E.4
-
5
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
BACKSTROM, L., DWORK, C., AND KLEINBERG, J. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In ACM WWW (2007), pp. 181-190.
-
(2007)
ACM WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
6
-
-
77954728128
-
K-isomorphism: Privacy preserving network publication against structural attacks
-
CHENG, J., FU, A. W.-C., AND LIU, J. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD (2010), ACM, pp. 459-470.
-
SIGMOD (2010), ACM
, pp. 459-470
-
-
Cheng, J.1
Fu, A.W.-C.2
Liu, J.3
-
7
-
-
84904006029
-
Complexity of social network anonymization
-
CHESTER, S., KAPRON, B. M., SRIVASTAVA, G., AND VENKATESH, S. Complexity of social network anonymization. SNAM 3, 2 (2013), 151-166.
-
(2013)
SNAM
, vol.3
, Issue.2
, pp. 151-166
-
-
Chester, S.1
Kapron, B.M.2
Srivastava, G.3
Venkatesh, S.4
-
9
-
-
84907023031
-
Knowledge vault: A web-scale approach to probabilistic knowledge fusion
-
DONG, X., GABRILOVICH, E., HEITZ, G., HORN, W., LAO, N., MUR-PHY, K., STROHMANN, T., SUN, S., AND ZHANG, W. Knowledge vault: A web-scale approach to probabilistic knowledge fusion. In SIGKDD (2014), ACM, pp. 601-610.
-
SIGKDD (2014), ACM
, pp. 601-610
-
-
Dong, X.1
Gabrilovich, E.2
Heitz, G.3
Horn, W.4
Lao, N.5
Mur-Phy, K.6
Strohmann, T.7
Sun, S.8
Zhang, W.9
-
10
-
-
33749016498
-
Information revelation and privacy in online social networks
-
GROSS, R., AND ACQUISTI, A. Information revelation and privacy in online social networks. In WPES (2005), ACM, pp. 71-80.
-
WPES (2005), ACM
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
-
11
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
HAY, M., MIKLAU, G., JENSEN, D., TOWSLEY, D., AND WEIS, P. Resisting structural re-identification in anonymized social networks. PVLDB 1, 1 (2008), 102-114.
-
(2008)
PVLDB
, vol.1
, Issue.1
, pp. 102-114
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
12
-
-
84868310326
-
Anonymizing social networks
-
HAY, M., MIKLAU, G., JENSEN, D., WEIS, P., AND SRIVASTAVA, S. Anonymizing social networks. Computer Science Department Faculty Publication Series (2007), 180.
-
(2007)
Computer Science Department Faculty Publication Series
, pp. 180
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
13
-
-
85029362126
-
Knowledge graphs
-
JAMES, P. Knowledge graphs. Order 501 (1992), 6439.
-
(1992)
Order
, vol.501
, pp. 6439
-
-
James, P.1
-
14
-
-
84969960836
-
On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge
-
JI, S., LI, W., GONG, N. Z., MITTAL, P., AND BEYAH, R. On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge. NDSS (2015).
-
(2015)
NDSS
-
-
Ji, S.1
Li, W.2
Gong, N.Z.3
Mittal, P.4
Beyah, R.5
-
15
-
-
84910612222
-
Structural data de-anonymization: Quantification, practice, and implications
-
JI, S., LI, W., SRIVATSA, M., AND BEYAH, R. Structural data de-anonymization: Quantification, practice, and implications. In ACM CCS (2014), pp. 1040-1053.
-
(2014)
ACM CCS
, pp. 1040-1053
-
-
Ji, S.1
Li, W.2
Srivatsa, M.3
Beyah, R.4
-
16
-
-
84921353541
-
Structure based data de-anonymization of social networks and mobility traces
-
Springer
-
JI, S., LI, W., SRIVATSA, M., HE, J. S., AND BEYAH, R. Structure based data de-anonymization of social networks and mobility traces. In Information Security. Springer, 2014, pp. 237-254.
-
(2014)
Information Security
, pp. 237-254
-
-
Ji, S.1
Li, W.2
Srivatsa, M.3
He, S.H.E.4
Beyah, R.5
-
17
-
-
84921415048
-
Collusion-tolerable privacy-preserving sum and product calculation without secure channel
-
JUNG, T., LI, X.-Y., AND WAN, M. Collusion-tolerable privacy-preserving sum and product calculation without secure channel. TDSC 12, 1 (2015), 45-57.
-
(2015)
TDSC
, vol.12
, Issue.1
, pp. 45-57
-
-
Jung, T.1
Li, X.-Y.2
Wan, M.3
-
18
-
-
84919829652
-
Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
-
JUNG, T., LI, X.-Y., WAN, Z., AND WAN, M. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. TIFS 10, 1 (2015), 190-199.
-
(2015)
TIFS
, vol.10
, Issue.1
, pp. 190-199
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
-
19
-
-
84883089676
-
Privacy-preserving data aggregation without secure channel: Multi-variate polynomial evaluation
-
JUNG, T., MAO, X., LI, X.-Y., TANG, S.-J., GONG, W., AND ZHANG, L. Privacy-preserving data aggregation without secure channel: Multi-variate polynomial evaluation. In INFOCOM (2013), IEEE, pp. 2634-2642.
-
INFOCOM (2013), IEEE
, pp. 2634-2642
-
-
Jung, T.1
Mao, X.2
Li, X.-Y.3
Tang, S.-J.4
Gong, W.5
Zhang, L.6
-
20
-
-
84873663513
-
Flash: Efficient, stable and optimal k-anonymity
-
KOHLMAYER, F., PRASSER, F., ECKERT, C., KEMPER, A., AND KUHN, K. A. Flash: efficient, stable and optimal k-anonymity. In IEEE PASSAT (2012), pp. 708-717.
-
(2012)
IEEE PASSAT
, pp. 708-717
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.A.5
-
22
-
-
80053232762
-
Random walk inference and learning in a large scale knowledge base
-
LAO, N., MITCHELL, T., AND COHEN, W. W. Random walk inference and learning in a large scale knowledge base. In EMNLP (2011), Association for Computational Linguistics, pp. 529-539.
-
EMNLP (2011), Association for Computational Linguistics
, pp. 529-539
-
-
Lao, N.1
Mitchell, T.2
Cohen, W.W.3
-
23
-
-
84983261952
-
Graph-based privacy-preserving data publication
-
LI, X.-Y., ZHANG, C., JUNG, T., QIAN, J., AND CHEN, L. Graph-based privacy-preserving data publication. In INFOCOM (2015), IEEE.
-
INFOCOM (2015), IEEE
-
-
Li, X.-Y.1
Zhang, C.2
Jung, T.3
Qian, J.4
Chen, L.5
-
24
-
-
57149126815
-
Towards identity anonymization on graphs
-
LIU, K., AND TERZI, E. Towards identity anonymization on graphs. In SIGMOD (2008), ACM, pp. 93-106.
-
SIGMOD (2008), ACM
, pp. 93-106
-
-
Liu, K.1
Terzi, E.2
-
25
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
MACHANAVAJJHALA, A., KIFER, D., GEHRKE, J., AND VENKITASUB-RAMANIAM, M. l-diversity: Privacy beyond k-anonymity. ACM TKDD 1, 1 (2007), 3.
-
(2007)
ACM TKDD
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasub-Ramaniam, M.4
-
26
-
-
84905984752
-
Preserving link privacy in social network based systems
-
MITTAL, P., PAPAMANTHOU, C., AND SONG, D. Preserving link privacy in social network based systems. In NDSS (2013), ISOC.
-
NDSS (2013), ISOC
-
-
Mittal, P.1
Papamanthou, C.2
Song, D.3
-
27
-
-
84912103106
-
Predicting the influencers on wireless subscriber churn
-
MOTAHARI, S., JUNG, T., ZANG, H., JANAKIRAMAN, K., LI, X.-Y., AND HOO, K. S. Predicting the influencers on wireless subscriber churn. In WCNC (2014), IEEE, pp. 3402-3407.
-
WCNC (2014), IEEE
, pp. 3402-3407
-
-
Motahari, S.1
Jung, T.2
Zang, H.3
Janakiraman, K.4
Li, X.-Y.5
Hoo, K.S.6
-
28
-
-
70449632682
-
De-anonymizing social net-works
-
NARAYANAN, A., AND SHMATIKOV, V. De-anonymizing social net-works. In IEEE S&P (2009), pp. 173-187.
-
(2009)
IEEE S&P
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
29
-
-
84910630062
-
Community-enhanced de-anonymization of online social networks
-
NILIZADEH, S., KAPADIA, A., AND AHN, Y.-Y. Community-enhanced de-anonymization of online social networks. In ACM CCS (2014), pp. 537-548.
-
(2014)
ACM CCS
, pp. 537-548
-
-
Nilizadeh, S.1
Kapadia, A.2
Ahn, Y.-Y.3
-
30
-
-
84897734719
-
A Bayesian method for matching two similar graphs without seeds
-
PEDARSANI, P., FIGUEIREDO, D. R., AND GROSSGLAUSER, M. A bayesian method for matching two similar graphs without seeds. In Allerton (2013), pp. 1598-1607.
-
(2013)
Allerton
, pp. 1598-1607
-
-
Pedarsani, P.1
Figueiredo, D.R.2
Grossglauser, M.3
-
31
-
-
84892402373
-
A two-stage deanonymization attack against anonymized social networks
-
PENG, W., LI, F., ZOU, X., AND WU, J. A two-stage deanonymization attack against anonymized social networks. TC 63, 2 (2014), 290-303.
-
(2014)
TC
, vol.63
, Issue.2
, pp. 290-303
-
-
Peng, W.1
Li, F.2
Zou, X.3
Wu, J.4
-
32
-
-
84957061291
-
Linear time 1/2-approximation algorithm for maximum weighted matching in general graphs
-
Springer
-
PREIS, R. Linear time 1/2-approximation algorithm for maximum weighted matching in general graphs. In STACS (1999), Springer, pp. 259-269.
-
(1999)
STACS
, pp. 259-269
-
-
Preis, R.1
-
34
-
-
84891936872
-
Knowledge graph identification
-
Springer
-
PUJARA, J., MIAO, H., GETOOR, L., AND COHEN, W. Knowledge graph identification. In The Semantic Web-ISWC 2013. Springer, 2013, pp. 542-557.
-
(2013)
The Semantic Web-ISWC 2013
, pp. 542-557
-
-
Pujara, J.1
Miao, H.2
Getoor, L.3
Cohen, W.4
-
35
-
-
84964837698
-
A differentially private selective aggregation scheme for online user behavior analysis
-
QIAN, J., QIU, F., WU, F., RUAN, N., CHEN, G., AND TANG, S. A differentially private selective aggregation scheme for online user behavior analysis. In GLOBECOM (2015), IEEE.
-
GLOBECOM (2015), IEEE
-
-
Qian, J.1
Qiu, F.2
Wu, F.3
Ruan, N.4
Chen, G.5
Tang, S.6
-
36
-
-
82955196835
-
Sharing graphs using differentially private graph models
-
SALA, A., ZHAO, X., WILSON, C., ZHENG, H., AND ZHAO, B. Y. Sharing graphs using differentially private graph models. In ACM Internet Measurement Conference (2011), pp. 81-98.
-
(2011)
ACM Internet Measurement Conference
, pp. 81-98
-
-
Sala, A.1
Zhao, X.2
Wilson, C.3
Zheng, H.4
Zhao, B.Y.5
-
37
-
-
84897829255
-
Collaborative information seeking: Guest editors' introduction
-
SHAH, C., CAPRA, R., AND HANSEN, P. Collaborative information seeking: Guest editors' introduction. IEEE TC 47, 3 (2014), 22-25.
-
(2014)
IEEE TC
, vol.47
, Issue.3
, pp. 22-25
-
-
Shah, C.1
Capra, R.2
Hansen, P.3
-
38
-
-
84869476246
-
Deanonymizing mobility traces: Using social network as a side-channel
-
SRIVATSA, M., AND HICKS, M. Deanonymizing mobility traces: Using social network as a side-channel. In ACM CCS (2012), pp. 628-637.
-
(2012)
ACM CCS
, pp. 628-637
-
-
Srivatsa, M.1
Hicks, M.2
-
39
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
SWEENEY, L. k-anonymity: A model for protecting privacy. IJUFKS 10, 05 (2002), 557-570.
-
(2002)
IJUFKS
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
40
-
-
80052678555
-
Privacy-preserving social network publication against friendship attacks
-
ACM
-
TAI, C.-H., YU, P. S., YANG, D.-N., AND CHEN, M.-S. Privacy-preserving social network publication against friendship attacks. In SIGKDD (2011), ACM, pp. 1262-1270.
-
(2011)
SIGKDD
, pp. 1262-1270
-
-
Tai, C.-H.1
Yu, P.S.2
Yang, D.-N.3
Chen, M.-S.4
-
41
-
-
84880088538
-
Structural diversity for privacy in publishing social networks
-
SIAM
-
TAI, C.-H., YU, P. S., YANG, D.-N., AND CHEN, M.-S. Structural diversity for privacy in publishing social networks. In SDM (2011), SIAM, pp. 35-46.
-
(2011)
SDM
, pp. 35-46
-
-
Tai, C.-H.1
Yu, P.S.2
Yang, D.-N.3
Chen, M.-S.4
-
42
-
-
84883097279
-
Outsourcing privacy-preserving social networks to a cloud
-
WANG, G., LIU, Q., LI, F., YANG, S., AND WU, J. Outsourcing privacy-preserving social networks to a cloud. In IEEE INFOCOM (2013), pp. 2886-2894.
-
(2013)
IEEE INFOCOM
, pp. 2886-2894
-
-
Wang, G.1
Liu, Q.2
Li, F.3
Yang, S.4
Wu, J.5
-
43
-
-
84897859690
-
Identifying knowledge brokers and their role in enterprise research through social media
-
XU, Z., RAMANATHAN, J., AND RAMNATH, R. Identifying knowledge brokers and their role in enterprise research through social media. IEEE TC 47, 3 (2014), 26-31.
-
(2014)
IEEE TC
, vol.47
, Issue.3
, pp. 26-31
-
-
Xu, Z.1
Ramanathan, J.2
Ramnath, R.3
-
44
-
-
84887296627
-
On the performance of percolation graph matching
-
ACM
-
YARTSEVA, L., AND GROSSGLAUSER, M. On the performance of percolation graph matching. In COSN (2013), ACM, pp. 119-130.
-
(2013)
COSN
, pp. 119-130
-
-
Yartseva, L.1
Grossglauser, M.2
-
45
-
-
84904437773
-
Achieving differential privacy of data disclosure in the smart grid
-
IEEE
-
ZHAO, J., JUNG, T., WANG, Y., AND LI, X.-Y. Achieving differential privacy of data disclosure in the smart grid. In INFOCOM (2014), IEEE, pp. 504-512.
-
(2014)
INFOCOM
, pp. 504-512
-
-
Zhao, J.1
Jung, T.2
Wang, Y.3
Li, X.-Y.4
-
46
-
-
52649120205
-
Preserving privacy in social networks against neighborhood attacks
-
ZHOU, B., AND PEI, J. Preserving privacy in social networks against neighborhood attacks. In IEEE ICDE (2008), pp. 506-515.
-
(2008)
IEEE ICDE
, pp. 506-515
-
-
Zhou, B.1
Pei, J.2
-
47
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
ZOU, L., CHEN, L., AND ÖZSU, M. T. K-automorphism: A general framework for privacy preserving network publication. PVLDB 2, 1 (2009), 946-957.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
|