|
[1]
|
Ferri, F., Grifoni, P. and Guzzo, T. (2012) New Forms of Social and Professional Digital Relationships: The Case of Facebook. Social Network Analysis and Mining, 2, 121-137. [Google Scholar] [CrossRef]
|
|
[2]
|
Sweeney, L. (2002) K-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainly, Fuzziness, and Knowledge Based Systems, 10, 557-570. [Google Scholar] [CrossRef]
|
|
[3]
|
Ford, R., Truta, T.M. and Campan, A. (2009) P-Sensitive K-anonymity for social networks. In: Stahlbock, R., Crone, S.F., Lessmann, S., eds., International Conference on Data Mining, CSREA Press, Las Vegas, 403-409.
|
|
[4]
|
吴宏伟. 社会网络数据发布中的隐私匿名技术研究[D]: [硕士学位论文]. 黑龙江: 哈尔滨工程大学, 2013.
|
|
[5]
|
贾俊杰, 闫国蕾. 一种个性化(p, k)-匿名隐私保护算法[J]. 计算机工程, 2018, 44(1): 176-181.
|
|
[6]
|
姜火文, 占清华, 刘文娟, 马海英. 图数据发布隐私保护的聚类匿名方法[J]. 软件学报, 2017, 28(9): 2323-2333.
|
|
[7]
|
Liu, K. and Terzi, E. (2008) Towards Identity Anonymization on Graphs. Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD 2008), 2008, 93-106. [Google Scholar] [CrossRef]
|
|
[8]
|
Casas-Roma, J., Herrera-Joancomartí, J. and Torra, V. (2017) k-Degree Anonymity and Edge Selection: Improving Data Utility in Large Networks. Knowledge and Information Systems, 50, 447-474. [Google Scholar] [CrossRef]
|
|
[9]
|
Casas-Roma, J., et al. (2019) k-Degree Anonymity on Directed Networks. Knowledge and Information Systems, 61, 1743-1768. [Google Scholar] [CrossRef]
|
|
[10]
|
Kiabod, M., Dehkordi, M.N. and Barekatain, B. (2019) TSRAM: A Time-Saving k-Degree Anonymization Method in Social Network. Expert System, 125, 378- 396. [Google Scholar] [CrossRef]
|
|
[11]
|
金叶, 丁晓波, 龚国强, 吕科. 基于节点分类的k度匿名隐私保护方法[J/OL]. 计算机工程, 1-7.
2020-03-26.[CrossRef]
|
|
[12]
|
Portela, J., García Villalba, L.J., Silva Tru-jillo, A.G., Sandoval Orozco, A.L. and Kim, T.-H. (2016) Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks. Sensors, 16, 1832-1847. [Google Scholar] [CrossRef] [PubMed]
|