메뉴 건너뛰기




Volumn 22, Issue 8, 2018, Pages 2583-2601

A novel subgraph K+-isomorphism method in social network based on graph similarity detection

Author keywords

Maximum common subgraph; Privacy preservation; Social network; Subgraph K anonymization; Subgraph similarity detection

Indexed keywords

SOCIAL NETWORKING (ONLINE); SOFT COMPUTING; SOFTWARE ENGINEERING;

EID: 85012914294     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-017-2513-y     Document Type: Article
Times cited : (57)

References (45)
  • 2
    • 84929471718 scopus 로고    scopus 로고
    • Incremental learning for v-support vector regression
    • Bin G, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015a) Incremental learning for v-support vector regression. Neural Netw 67:140–150
    • (2015) Neural Netw , vol.67 , pp. 140-150
    • Bin, G.1    Sheng, V.S.2    Wang, Z.3    Ho, D.4    Osman, S.5    Li, S.6
  • 4
    • 0032024433 scopus 로고    scopus 로고
    • A graph distance metric based on the maximal common subgraph
    • Bunke H, Shearer K (1998) A graph distance metric based on the maximal common subgraph. Pattern Recognit Lett 19(3–4):255–259
    • (1998) Pattern Recognit Lett , vol.19 , Issue.3-4 , pp. 255-259
    • Bunke, H.1    Shearer, K.2
  • 5
    • 84939264034 scopus 로고    scopus 로고
    • Anonymizing graphs: measuring quality for clustering
    • Casas-Roma J, Herrera-Joancomart J, Torra V (2014) Anonymizing graphs: measuring quality for clustering. Knowl Inf Syst 44(3):507–528
    • (2014) Knowl Inf Syst , vol.44 , Issue.3 , pp. 507-528
    • Casas-Roma, J.1    Herrera-Joancomart, J.2    Torra, V.3
  • 8
    • 77954728128 scopus 로고    scopus 로고
    • K-isomorphism: privacy preserving network publication against structural attacks
    • Indianapolis, Indiana, USA, June
    • Cheng J, Fu W C, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: ACM SIGMOD international conference on management of data, SIGMOD 2010, Indianapolis, Indiana, USA, June, pp 459–470
    • (2010) ACM SIGMOD international conference on management of data, SIGMOD , vol.2010 , pp. 459-470
    • Cheng, J.1    Fu, W.C.2    Liu, J.3
  • 10
    • 84919663898 scopus 로고    scopus 로고
    • Overlapping community detection using neighborhood ratio matrix
    • Eustace J, Wang X (2015) Overlapping community detection using neighborhood ratio matrix. Phys A 421:510–521
    • (2015) Phys A , vol.421 , pp. 510-521
    • Eustace, J.1    Wang, X.2
  • 11
    • 0037062448 scopus 로고    scopus 로고
    • Community structure in social and biological networks
    • Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821–7826
    • (2002) Proc Natl Acad Sci , vol.99 , Issue.12 , pp. 7821-7826
    • Girvan, M.1    Newman, M.E.J.2
  • 13
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936
    • (2014) J Internet Technol , vol.15 , Issue.6 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.4
  • 14
    • 85044138147 scopus 로고    scopus 로고
    • Edge partitioning approach for protecting sensitive relationships in social network
    • Guoting F, Yonglong L, Dandan S, Taochun W, Xiaoyao Z (2016) Edge partitioning approach for protecting sensitive relationships in social network. J Comput Appl 36(1):207–211
    • (2016) J Comput Appl , vol.36 , Issue.1 , pp. 207-211
    • Guoting, F.1    Yonglong, L.2    Dandan, S.3    Taochun, W.4    Xiaoyao, Z.5
  • 15
    • 84865624038 scopus 로고    scopus 로고
    • An efficient k-anonymization algorithm with low information loss
    • Huda MN, Yamada S, Sonehara N (2013) An efficient k-anonymization algorithm with low information loss. Lect Notes Electr Eng 156:249–254
    • (2013) Lect Notes Electr Eng , vol.156 , pp. 249-254
    • Huda, M.N.1    Yamada, S.2    Sonehara, N.3
  • 16
    • 84886021495 scopus 로고    scopus 로고
    • Fast similar subgraph search with maximum common connected subgraph constraints
    • Hu H, Li G, Feng J (2013) Fast similar subgraph search with maximum common connected subgraph constraints. In: IEEE International Congress on big data, pp 181–188
    • (2013) IEEE International Congress on big data , pp. 181-188
    • Hu, H.1    Li, G.2    Feng, J.3
  • 19
    • 84891780582 scopus 로고    scopus 로고
    • Visualized book recommender system using matrix clustering
    • Kuo JJ, Chang JS, Zhang YJ (2013) Visualized book recommender system using matrix clustering. J Educ Media Libr Sci 51(1):5–35
    • (2013) J Educ Media Libr Sci , vol.51 , Issue.1 , pp. 5-35
    • Kuo, J.J.1    Chang, J.S.2    Zhang, Y.J.3
  • 20
    • 84907558944 scopus 로고    scopus 로고
    • Uncovering the overlapping community structure of complex networks by maximal cliques
    • Li J, Wang X (2014) Uncovering the overlapping community structure of complex networks by maximal cliques. Phys A 415:398–406
    • (2014) Phys A , vol.415 , pp. 398-406
    • Li, J.1    Wang, X.2
  • 21
    • 80052706869 scopus 로고    scopus 로고
    • A generalization based approach for anonymizing weighted social network graphs
    • In: Springer, Berlin
    • Liu X, Yang X (2011) A generalization based approach for anonymizing weighted social network graphs. In: International conference on web-age information management. Springer, Berlin, pp 118–130
    • (2011) International conference on web-age information management , pp. 118-130
    • Liu, X.1    Yang, X.2
  • 22
    • 84944512081 scopus 로고    scopus 로고
    • An efficient and scalable density-based clustering algorithm for datasets with complex structures
    • Lv Y, Ma T, Tang M et al (2016) An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171:9–22
    • (2016) Neurocomputing , vol.171 , pp. 9-22
    • Lv, Y.1    Ma, T.2    Tang, M.3
  • 23
    • 84945485084 scopus 로고    scopus 로고
    • KDVEM: a k-degree anonymity with vertex and edge modification algorithm
    • Ma T, Zhang Y, Cao J et al (2015a) KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12):1165–1184
    • (2015) Computing , vol.97 , Issue.12 , pp. 1165-1184
    • Ma, T.1    Zhang, Y.2    Cao, J.3
  • 24
    • 84926455204 scopus 로고    scopus 로고
    • Social network and tag sources based augmenting collaborative recommender system
    • Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015b) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans 98(D(4)):902–910
    • (2015) IEICE Trans , vol.98 , Issue.D4 , pp. 902-910
    • Ma, T.1    Zhou, J.2    Tang, M.3    Tian, Y.4    Al-Dhelaan, A.5    Al-Rodhaan, M.6    Lee, S.7
  • 25
    • 84971658592 scopus 로고    scopus 로고
    • LED: a fast overlapping communities detection algorithm based on structural clustering
    • Ma T, Wang Y, Tang M et al (2016a) LED: a fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207:488–500
    • (2016) Neurocomputing , vol.207 , pp. 488-500
    • Ma, T.1    Wang, Y.2    Tang, M.3
  • 27
    • 3142768191 scopus 로고    scopus 로고
    • Biclustering algorithms for biological data analysis: a survey
    • Madeira SC, Oliveira AL (2004) Biclustering algorithms for biological data analysis: a survey. IEEE ACM Trans Comput Biol Bioinform 1(1):24–45
    • (2004) IEEE ACM Trans Comput Biol Bioinform , vol.1 , Issue.1 , pp. 24-45
    • Madeira, S.C.1    Oliveira, A.L.2
  • 28
    • 84934996790 scopus 로고    scopus 로고
    • Community detection for graph-based similarity: application to protein binding pockets classification
    • Mallek S, Boukhris I, Elouedi Z (2015) Community detection for graph-based similarity: application to protein binding pockets classification. Pattern Recognit Lett 62:49–54
    • (2015) Pattern Recognit Lett , vol.62 , pp. 49-54
    • Mallek, S.1    Boukhris, I.2    Elouedi, Z.3
  • 29
    • 0019909679 scopus 로고
    • Backtrack search algorithms and the maximal common subgraph problem
    • Mcgregor JJ (1982) Backtrack search algorithms and the maximal common subgraph problem. Softw Pract Exp 12(1):23–34
    • (1982) Softw Pract Exp , vol.12 , Issue.1 , pp. 23-34
    • Mcgregor, J.J.1
  • 31
    • 85044146735 scopus 로고    scopus 로고
    • Anonymization in social networks: a survey on the issues of data privacy in social network sites
    • Praveena A, Smys S (2016) Anonymization in social networks: a survey on the issues of data privacy in social network sites. Int J Eng Comput Sci 5(3):15912–15918
    • (2016) Int J Eng Comput Sci , vol.5 , Issue.3 , pp. 15912-15918
    • Praveena, A.1    Smys, S.2
  • 32
    • 84938356327 scopus 로고    scopus 로고
    • Ambiguity in social network data for presence, sensitive-attribute, degree and relationship privacy protection
    • e0130693
    • Rajaei M, Haghjoo MS, Miyaneh EK (2015) Ambiguity in social network data for presence, sensitive-attribute, degree and relationship privacy protection. PLoS ONE 10(6):e0130693
    • (2015) PLoS ONE , vol.10 , Issue.6
    • Rajaei, M.1    Haghjoo, M.S.2    Miyaneh, E.K.3
  • 33
    • 0036663707 scopus 로고    scopus 로고
    • Maximum common subgraph isomorphism algorithms for the matching of chemical structures
    • Raymond JW, Willett P (2002) Maximum common subgraph isomorphism algorithms for the matching of chemical structures. J Comput Aided Mol Des 16(7):521–533
    • (2002) J Comput Aided Mol Des , vol.16 , Issue.7 , pp. 521-533
    • Raymond, J.W.1    Willett, P.2
  • 34
    • 0016870630 scopus 로고
    • An algorithm for subgraph isomorphism
    • Ullmann JR (1976) An algorithm for subgraph isomorphism. J ACM 23(23):31–42
    • (1976) J ACM , vol.23 , Issue.23 , pp. 31-42
    • Ullmann, J.R.1
  • 36
    • 84911495921 scopus 로고    scopus 로고
    • High utility K-anonymization for social network publishing
    • Wang Y, Xie L, Zheng B et al (2014) High utility K-anonymization for social network publishing. Knowl Inf Syst 41(3):697–725
    • (2014) Knowl Inf Syst , vol.41 , Issue.3 , pp. 697-725
    • Wang, Y.1    Xie, L.2    Zheng, B.3
  • 37
    • 84961291654 scopus 로고    scopus 로고
    • A rapid learning algorithm for vehicle classification
    • Wen X, Shao L, Xue Y, Wei F (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295(1):395–406
    • (2015) Inf Sci , vol.295 , Issue.1 , pp. 395-406
    • Wen, X.1    Shao, L.2    Xue, Y.3    Wei, F.4
  • 39
    • 84966687511 scopus 로고    scopus 로고
    • A personalized sensitive label-preserving model and algorithm based on utility in social network data publishing
    • Xie Y, Zheng M, Liu L (2016) A personalized sensitive label-preserving model and algorithm based on utility in social network data publishing. LNCS 9567:1–11
    • (2016) LNCS , vol.9567 , pp. 1-11
    • Xie, Y.1    Zheng, M.2    Liu, L.3
  • 41
    • 84906519157 scopus 로고    scopus 로고
    • A secure K-automorphism privacy preserving approach with high data utility in social networks
    • Yang J, Wang B, Yang X et al (2014) A secure K-automorphism privacy preserving approach with high data utility in social networks. Secur Commun Netw 7(9):1399–1411
    • (2014) Secur Commun Netw , vol.7 , Issue.9 , pp. 1399-1411
    • Yang, J.1    Wang, B.2    Yang, X.3
  • 42
    • 84956860357 scopus 로고    scopus 로고
    • A combined model of clustering and classification methods for preserving privacy in social networks against inference and neighborhood attacks
    • Zaghian A, Bagheri A (2016) A combined model of clustering and classification methods for preserving privacy in social networks against inference and neighborhood attacks. Int J Secur Appl 10(1):95–102
    • (2016) Int J Secur Appl , vol.10 , Issue.1 , pp. 95-102
    • Zaghian, A.1    Bagheri, A.2
  • 43
    • 76749101527 scopus 로고    scopus 로고
    • Binary matrix factorization for analyzing gene expression data
    • Zhang ZY, Li T, Ding C et al (2010) Binary matrix factorization for analyzing gene expression data. Data Min Knowl Discov 20(1):28–52
    • (2010) Data Min Knowl Discov , vol.20 , Issue.1 , pp. 28-52
    • Zhang, Z.Y.1    Li, T.2    Ding, C.3
  • 44
    • 84903450035 scopus 로고    scopus 로고
    • Protecting encrypted data against inference attacks in outsourced databases
    • Zhang XL, Tang Y (2014) Protecting encrypted data against inference attacks in outsourced databases. Appl Mech Mater 571–572:621–625
    • (2014) Appl Mech Mater , vol.571-572 , pp. 621-625
    • Zhang, X.L.1    Tang, Y.2
  • 45
    • 84921899998 scopus 로고    scopus 로고
    • Image segmentation by generalized hierarchical fuzzy C-means algorithm
    • Zheng Y, Jeon B, Danhua X, Jonathan Wu QM, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28(2):961–973
    • (2015) J Intell Fuzzy Syst , vol.28 , Issue.2 , pp. 961-973
    • Zheng, Y.1    Jeon, B.2    Danhua, X.3    Jonathan Wu, Q.M.4    Zhang, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.