[1] BACKSTROM L,DWORK C,KLEINBERG J,et al.Wherefore art thou R3579X? anonymized social networks,hidden patterns,and structural steganography[J].Com-munications of the ACM,2011,54(12):133-141. [2] SALAS J,TORRA V.Graphic sequences,distances and k-degree anonymity[J].Discrete Applied Mathematics,2015,188:25-31. [3] BHATTACHARYA M,MANI P.Preserving privacy in social network graph with K-anonymize degree sequence generation[C]//Proceedings of 2015 International Conference on Software,Knowledge,Information Management and Applications.Washington D.C.,USA:IEEE Press,2015:1-7. [4] MACWAN K R,PATEL S J.K-NMF anonymization in social network data publishing[J].The Computer Journal,2018,61(4):601-613. [5] YANG Dianhui.Large scale social network privacy protection based on heuristic analysis[D].Xi'an:University of Electronic Science and Technology of China,2013.(in Chinese)杨典辉.基于启发式分析的大规模社会网络隐私保护[D].西安:电子科技大学,2013. [6] ZHANG Xiaolin,ZHANG Wenchao,ZHANG Chen,et al.D-GSPerturb:a distributed social privacy protection algorithm based on graph structure perturbation[J].Journal of Computers,2017,28(5):51-61. [7] SUN Yongjiao,YUAN Ye,WANG Guoren,et al.Splitting anonymization:a novel privacy-preserving approach of social network[J].Knowledge and Information Systems,2016,47(3):595-623. [8] KASIVISWANATHAN S P,NISSIM K,RASKHODNIKOVA S,et al.Analyzing graphs with node differential privacy[M].Berlin,Germany:Springer,2013:457-476. [9] LIU Xiangyu,WANG Bin,YANG Xiaochun.Survey on privacy preserving techniques for publishing social network data[J].Journal of Software,2014,25(3):576-590.(in Chinese)刘向宇,王斌,杨晓春.社会网络数据发布隐私保护技术综述[J].软件学报,2014,25(3):576-590. [10] LIU K,TERZI E.Towards identity anonymization on graphs[C]//Proceedings of 2008 ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2008:93-106. [11] CASAS-ROMA J,HERRERA-JOANCOMARTÍ J,TORRA V.k-degree anonymity and edge selection:improving data utility in large networks[J].Knowledge and Information Systems,2017,50(2):447-474. [12] MACWAN K R,PATEL S J.K-degree anonymity model for social network data publishing[J].Advances in Electrical and Computer Engineering,2017,17(4):117-124. [13] YU D R,ZHAO H X,WANG L E,et al.A hierarchical k-anonymous technique of graphlet structural perception in social network publishing[M].Berlin,Germany:Springer,2019:224-239. [14] GONG Weihua,LAN Xuefeng,PEI Xiaobing,et al.Privacy preservation method based on k-degree anonymity in social networks[J].Acta Electronica Sinica,2016,44(6):1437-1444.(in Chinese)龚卫华,兰雪锋,裴小兵,等.基于k-度匿名的社会网络隐私保护方法[J].电子学报,2016,44(6):1437-1444. [15] LIU Xiangyu,LI Jiajia,AN Yunzhe,et al.Efficient algorithm on anonymizing social networks with reachability preservation[J].Journal of Software,2016,27(8):1904-1921.(in Chinese)刘向宇,李佳佳,安云哲,等.一种保持结点可达性的高效社会网络图匿名算法[J].软件学报,2016,27(8):1904-1921. [16] ZHANG Xiaolin,HE Xiaoyu,ZHANG Huanxiang,et al.PLRD-(k,m):distributed k-degree-m-label anonymity with protecting link rela-tionships[J].Journal of Frontiers of Computer Science and Technology,2019,13(1):70-82.(in Chinese)张晓琳,何晓玉,张换香,等.PLRD-(k,m):保护链接关系的分布式k-度-m-标签匿名方法[J].计算机科学与探索,2019,13(1):70-82. [17] YING Xiaowei,WU Xintao.On link privacy in randomizing social networks[J].Knowledge and Information Systems,2011,28(3):645-663. [18] CAMPAN A,ALUFAISAN Y,TRUTA T M.Preserving communities in anonymized social networks[J].Transactions on Data Privacy,2015,8(1):55-87. [19] WANG Huanjie,LIU Peng,LIN Shan,et al.A local-perturbation anonymizing approach to preserving community structure in released social networks[M].Berlin,Germany:Springer,2017:36-45. [20] KUMAR S,KUMAR P.Upper approximation based privacy preserving in online social networks[J].Expert Systems with Applications,2017,88:276-289. [21] ROUSSEAU F,CASAS-ROMA J,VAZIRGIANNIS M.Community-preserving anonymization of graphs[J].Knowledge and Information Systems,2018,54(2):315-343. [22] CLAUSET A,MOORE C,NEWMAN M E J.Hierarchical structure and the prediction of missing links in networks[J].Nature,2008,453(7191):98-101. [23] CHESTER S,KAPRON B M,RAMESH G,et al.Why Waldo befriended the dummy? k-anonymization of social networks with pseudo-nodes[J].Social Network Analysis and Mining,2013,3(3):381-399. [24] CAI Bingjing,WANG Haiying,ZHENG Huiru,et al.Evaluation repeated random walks in community detection of social networks[C]//Proceedings of 2010 International Conference on Machine Learning and Cybernetics.Washington D.C.,USA:IEEE Press,2010:1849-1854. |